CVE-2025-6437

WordPress · WordPress Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager

A high-severity SQL Injection vulnerability in the Ads Pro Plugin for WordPress allows an unauthenticated attacker to execute arbitrary SQL commands, potentially leading to sensitive data exfiltration.

Executive summary

A high-severity SQL Injection vulnerability in the Ads Pro Plugin for WordPress allows an unauthenticated attacker to execute arbitrary SQL commands, potentially leading to sensitive data exfiltration.

Vulnerability

The plugin is vulnerable to SQL Injection due to insufficient input sanitization of the ‘oid’ parameter. A remote, unauthenticated attacker can craft a malicious request to this parameter to execute arbitrary SQL queries against the application's database.

Business impact

A successful exploit could allow an attacker to read, modify, or delete sensitive data from the database, including user information, configuration settings, or other business-critical data. The High severity rating, reflected by the CVSS score of 7.5, underscores the significant risk of data compromise and potential for further system intrusion. This could lead to a data breach, reputational damage, and regulatory penalties.

Remediation

Immediate Action: Immediately update the Ads Pro Plugin to the latest patched version provided by the vendor. If the plugin is no longer essential, it should be deactivated and removed entirely.

Proactive Monitoring: Monitor web server and database logs for unusual or malformed SQL queries, paying close attention to requests involving the vulnerable ‘oid’ parameter.

Compensating Controls: Implement and configure a Web Application Firewall (WAF) with rulesets designed to detect and block SQL injection attack patterns, which can serve as a virtual patch.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high risk of data exfiltration and the relative ease of exploitation for this type of flaw, immediate remediation is critical. We strongly advise administrators to prioritize the application of the vendor-supplied update to prevent the potential compromise of the underlying WordPress database and the web application it supports.