CVE-2025-49447
BaseFortify
Publication date: 2025-06-17
Last updated on: 2026-04-28
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an arbitrary file upload flaw in the FW Food Menu WordPress plugin (up to version 6.0.0) that allows unauthenticated attackers to upload malicious files, such as backdoors, to the affected website. This can lead to full site compromise. It is classified under OWASP Top 10 category A3: Injection and has a critical severity with a CVSS score of 10.0. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability can allow attackers to upload malicious files without authentication, potentially leading to full compromise of the affected website. This includes unauthorized access, data theft, site defacement, or use of the site for further attacks. Automated attacks are likely due to the high severity and ease of exploitation. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection involves monitoring for arbitrary file uploads, especially of suspicious file types or unexpected files in the web server directories. Since the vulnerability allows unauthenticated attackers to upload malicious backdoors, scanning the web server for newly added or modified files with executable extensions (e.g., .php, .phtml) is recommended. Additionally, server-side malware scanning is advised as plugin-based scanners may be unreliable. Specific commands are not provided in the resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation includes applying the virtual patch (vPatch) provided by Patchstack, which blocks attack attempts until an official fix is released. It is safe to apply and test this virtual patch to protect affected sites immediately. Additionally, professional incident response and server-side malware scanning are recommended if compromise is suspected. Since no official patch is available yet, these steps are critical to reduce risk. [1]