Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-4380 PoC — Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager <= 4.89 - Unauthenticated Local File Inclusion

Source
Associated Vulnerability
Title:Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager <= 4.89 - Unauthenticated Local File Inclusion (CVE-2025-4380)
Description:The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.89 via the 'bsa_template' parameter of the `bsa_preview_callback` function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases .php files can can be uploaded and included, or already exist on the site.
Readme
# CVE-2025-4380 - Ads Pro Plugin <= 4.89 - Local File Inclusion (LFI) Exploit

## Description

This Python exploit targets **Ads Pro Plugin ≤ 4.89** for WordPress, vulnerable to **Local File Inclusion (LFI)** via the `bsa_preview_callback` AJAX action.

An unauthenticated attacker can exploit this to read arbitrary files from the server filesystem, including sensitive files such as `/etc/passwd`, `wp-config.php`, and more.

---

## Exploit Features

- Exploits **CVE-2025-4380** LFI vulnerability.
- Supports single target or mass exploitation.
- Saves outputs to file (optional).
- Supports HTTP proxies or TOR routing.
- Retry mechanism for reliability.

---

## Usage

### Single Target

```bash
python3 cve_2025_4380.py -u http://target.com -p ../../../../etc/passwd
```
### Multiple Targets (Mass Scan)
```bash
python3 cve_2025_4380.py -l targets.txt -p ../../../../etc/shadow
```
### Save Output to File
```bash
python3 cve_2025_4380.py -u http://target.com -p ../../../../etc/passwd -o output.txt
```
### Use Proxy (e.g., Burp, TOR)
```bash
python3 cve_2025_4380.py -u http://target.com -p ../../../../etc/passwd --proxy http://127.0.0.1:8080
```
## Parameters

| Argument         | Description                                     | Required |
| ---------------- | ----------------------------------------------- | -------- |
| `-u`, `--url`    | Target URL (e.g., `http://target.com`)          | Optional |
| `-l`, `--list`   | File with list of target URLs                   | Optional |
| `-p`, `--path`   | File path to include (e.g., `../../etc/passwd`) | **Yes**  |
| `-o`, `--output` | Output file to save results                     | Optional |
| `--proxy`        | Proxy (e.g., `http://127.0.0.1:8080`)           | Optional |

---

## Example

<img width="1900" height="700" alt="Screenshot_2025-07-20_18_42_08" src="https://github.com/user-attachments/assets/18cee98d-060b-4dd6-a8ad-89265df06f44" />


Burpsuite Request/Response

<img width="1920" height="672" alt="Screenshot_2025-07-20_18_42_45" src="https://github.com/user-attachments/assets/cc6b804b-47b3-47f6-868b-e63c5979b82e" />


<img width="1920" height="671" alt="Screenshot_2025-07-20_18_42_57" src="https://github.com/user-attachments/assets/b0749197-e601-4cc5-8819-ee6928fd087d" />



## Vulnerability Reference

-    CVE-2025-4380

-    Ads Pro Plugin <= 4.89 - Local File Inclusion via bsa_template in bsa_preview_callback

# ⚠️ Disclaimer

This exploit is provided for educational purposes and authorized security testing only.

---

## Official Channels

- [YouTube @rootctf](https://www.youtube.com/@rootctf)
- [X @r0otk3r](https://x.com/r0otk3r)
File Snapshot

[4.0K] /data/pocs/b4906d4cd62e99a5b9c7e8f3e7b5b983db70e3f0 ├── [3.4K] cve_2025_4380.py └── [2.6K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →