CVE-2025-49447
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-17

Last updated on: 2026-04-28

Assigner: Patchstack

Description
Unrestricted Upload of File with Dangerous Type vulnerability in Fastw3b LLC FW Food Menu allows Using Malicious Files. This issue affects FW Food Menu : from n/a through 6.0.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-17
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2025-06-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an arbitrary file upload flaw in the FW Food Menu WordPress plugin (up to version 6.0.0) that allows unauthenticated attackers to upload malicious files, such as backdoors, to the affected website. This can lead to full site compromise. It is classified under OWASP Top 10 category A3: Injection and has a critical severity with a CVSS score of 10.0. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can allow attackers to upload malicious files without authentication, potentially leading to full compromise of the affected website. This includes unauthorized access, data theft, site defacement, or use of the site for further attacks. Automated attacks are likely due to the high severity and ease of exploitation. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves monitoring for arbitrary file uploads, especially of suspicious file types or unexpected files in the web server directories. Since the vulnerability allows unauthenticated attackers to upload malicious backdoors, scanning the web server for newly added or modified files with executable extensions (e.g., .php, .phtml) is recommended. Additionally, server-side malware scanning is advised as plugin-based scanners may be unreliable. Specific commands are not provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation includes applying the virtual patch (vPatch) provided by Patchstack, which blocks attack attempts until an official fix is released. It is safe to apply and test this virtual patch to protect affected sites immediately. Additionally, professional incident response and server-side malware scanning are recommended if compromise is suspected. Since no official patch is available yet, these steps are critical to reduce risk. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart