CVE-2025-10487
WordPress · WordPress Advanced Ads – Ad Manager & AdSense plugin
A high-severity vulnerability has been identified in the 'Advanced Ads – Ad Manager & AdSense' WordPress plugin, which could allow a remote attacker to execute arbitrary code.
Executive summary
A high-severity vulnerability has been identified in the 'Advanced Ads – Ad Manager & AdSense' WordPress plugin, which could allow a remote attacker to execute arbitrary code. Successful exploitation of this flaw could lead to a complete compromise of the affected website, potentially resulting in data theft, service disruption, or the hosting of malicious content.
Vulnerability
This vulnerability allows a remote attacker to execute arbitrary code on the server hosting the WordPress site. The flaw likely exists within a specific function of the plugin that fails to properly sanitize user-supplied input or lacks sufficient authorization checks. This enables an attacker to craft a malicious request that injects and runs PHP code, granting the attacker the same level of permissions as the web server process and leading to a full system compromise.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.3, posing a significant risk to the organization. A successful exploit could lead to a complete compromise of the web server, resulting in severe business consequences such as the theft of sensitive customer or corporate data, reputational damage from website defacement, and financial loss due to service downtime. Furthermore, the compromised website could be used as a platform to launch further attacks against other internal systems or to distribute malware to visitors, creating potential legal and compliance liabilities.
Remediation
Immediate Action: Immediately update the 'Advanced Ads – Ad Manager & AdSense' plugin to the latest patched version released by the vendor. If the plugin is no longer essential for business operations, the recommended course of action is to deactivate and completely remove it to eliminate the attack surface.
Proactive Monitoring: Monitor web server access logs for unusual or malformed requests targeting the plugin's files or endpoints. Implement file integrity monitoring to detect unauthorized changes to core WordPress files, themes, and plugins, particularly the creation of new PHP files in upload directories. Monitor for suspicious outbound network connections from the web server.
Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with rules designed to block common code injection and remote execution attack patterns. Restrict access to the WordPress administrative dashboard to trusted IP addresses and enforce strong, unique passwords for all user accounts.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity (CVSS 7.3) of this Remote Code Execution vulnerability, immediate action is required to mitigate the risk of a full website compromise. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, RCE flaws in widely-used WordPress plugins are prime targets for opportunistic and targeted attacks. We strongly recommend that all instances of the 'Advanced Ads – Ad Manager & AdSense' plugin be updated to the latest patched version without delay. If the plugin is not critical, it should be removed entirely to eliminate this threat vector.