CVE-2025-4689

The · The Ads Pro Plugin - Multiple Products

A critical Local File Inclusion (LFI) vulnerability in The Ads Pro Plugin for WordPress allows an unauthenticated attacker to achieve Remote Code Execution (RCE), potentially leading to a full comprom.

Executive summary

A critical Local File Inclusion (LFI) vulnerability in The Ads Pro Plugin for WordPress allows an unauthenticated attacker to achieve Remote Code Execution (RCE), potentially leading to a full compromise of the affected website.**

Vulnerability

This vulnerability allows an unauthenticated remote attacker to perform Local File Inclusion (LFI). By exploiting this flaw, the attacker can include and execute arbitrary local files on the server, ultimately leading to Remote Code Execution (RCE).

Business impact

A successful exploit could result in a complete compromise of the web server. This would grant an attacker full control to steal sensitive data, deface the website, install malware, or use the server to attack other systems. The Critical severity is justified by the CVSS score of 9.8, reflecting the ease of exploitation and the maximum impact on confidentiality, integrity, and availability.

Remediation

Immediate Action: Administrators must immediately update The Ads Pro Plugin to the latest patched version to mitigate this vulnerability.

Proactive Monitoring: Review web server access logs for unusual requests attempting to traverse the file system or include unexpected files, which may indicate exploitation attempts.

Compensating Controls: Implement and configure a Web Application Firewall (WAF) with rules designed to block LFI and RCE attack patterns as a temporary compensating control if patching is delayed.

Exploitation status

Public Exploit Available: Not specified in provided data.

Analyst recommendation

Given the critical severity and the potential for a complete system takeover via Remote Code Execution, this vulnerability poses an immediate and severe risk. We strongly recommend that all administrators prioritize applying the vendor-supplied update without delay to prevent potential compromise.