漏洞名称: Ads Pro Plugin Local File Inclusion Vulnerability
漏洞编号:
CVE: CVE-2025-4380
漏洞类型: 文件包含
漏洞等级: 严重
漏洞描述: Ads Pro Plugin是WordPress的一个多功能广告管理插件,广泛应用于需要广告管理的WordPress网站。该插件在版本4.89及之前的所有版本中,存在一个本地文件包含漏洞,攻击者可以通过bsa_template参数在bsa_preview_callback函数中实现任意文件包含。这一漏洞的根源在于对用户输入的不当处理,导致攻击者可以包含并执行服务器上的任意文件,包括PHP文件,从而可能绕过访问控制、获取敏感数据或执行任意代码。由于该漏洞允许未认证的攻击者利用,且影响范围广泛,其严重性被评定为严重。攻击者可以利用此漏洞在受影响的系统上执行任意代码,导致数据泄露、服务中断或其他恶意活动。为了防范此漏洞,建议用户将Ads Pro Plugin更新至4.89之后的版本,或者禁用多态类型处理,实施适当的输入验证和反序列化控制。
产品厂商: scripteo
产品名称: Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager
info: name: Ads Pro Plugin <=4.89- Local File Inclusion author: iamnoooob,rootxharsh,pdresearch severity: critical description: | The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.89 via the 'bsa_template' parameter of the `bsa_preview_callback` function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases .php files can can be uploaded and included, or already exist on the site. impact: | Successful exploitation could allow an attacker to execute arbitrary code on the affected system through deserialization of malicious JSON payloads. remediation: | Update the Ads Pro Plugin to version later than 4.89. Alternatively, disable polymorphic type handling or implement proper input validation and deserialization controls. reference: - https://wpscan.com/vulnerability/63964564-73e6-45e2-8145-33e2e30d1d57/ - https://nvd.nist.gov/vuln/detail/CVE-2025-4380 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score:9.8 cve-id: CVE-2025-4380 cwe-id: CWE-98 cpe: cpe:2.3:a:scripteo:ads_pro:*:*:*:*:*:wordpress:*:* metadata: verified:true max-request:1 vendor: scripteo product: ads_pro fofa-query: body="/wp-content/plugins/ap-plugin-scripteo" tags: cve,cve2025,wp,wordpress,wp-plugin,lfi,scripteo,ads-pro