Description
Unrestricted Upload of File with Dangerous Type vulnerability in Fastw3b LLC FW Food Menu allows Using Malicious Files. This issue affects FW Food Menu : from n/a through 6.0.0.
Published: 2025-06-17
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The plugin contains an unrestricted file upload vulnerability that fails to validate the type of uploaded files. An attacker can supply files with dangerous content, such as PHP scripts, and place them in a web‑accessible directory. If the upload succeeds, the attacker can reach and execute the script, giving full control over the compromised WordPress installation. The flaw maps to CWE‑434: Unrestricted Upload of File with Dangerous Type and has a CVSS v3 base score of 10, indicating a critical severity that allows remote code execution with no additional user interaction when the vulnerability is exploited.

Affected Systems

Fastw3b LLC’s FW Food Menu plugin is impacted. All releases up to and including version 6.0.0 are vulnerable. The vulnerable code affects the plugin’s upload handling, which is typically accessible to users with the capability to upload menu assets. The effect is local to the WordPress site that runs the plugin, but the consequence is a full takeover of the web server if the uploaded payload is executed.

Risk and Exploitability

Even though the EPSS score sits below 1%, meaning the exploitation probability is low, the CVSS score of 10 and the nature of the flaw render the risk high for sites still running an affected version. The vulnerability is not listed in the CISA KEV catalog, but its severity warrants immediate attention. Attackers can exploit the flaw remotely by interacting with the upload endpoint, and if the plugin is misconfigured to allow unauthenticated uploads, the barrier to exploitation is minimal.

Generated by OpenCVE AI on April 30, 2026 at 11:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the FW Food Menu plugin to the latest version (≥6.0.1) or uninstall it if the plugin is no longer required.
  • If an immediate upgrade is not possible, disable the upload feature or restrict it to a secure file type whitelist and place the upload directory outside the web‑accessible path to prevent script execution.
  • Ensure that only trusted user roles have upload capability in the plugin and review role permissions to eliminate unnecessary upload privileges.

Generated by OpenCVE AI on April 30, 2026 at 11:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-18509 Unrestricted Upload of File with Dangerous Type vulnerability in Fastw3b LLC FW Food Menu allows Using Malicious Files. This issue affects FW Food Menu : from n/a through 6.0.0.
History

Tue, 28 Apr 2026 19:45:00 +0000


Tue, 28 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in Fastw3b LLC FW Food Menu fw-food-menu allows Using Malicious Files.This issue affects FW Food Menu : from n/a through <= 6.0.0. Unrestricted Upload of File with Dangerous Type vulnerability in Fastw3b LLC FW Food Menu allows Using Malicious Files. This issue affects FW Food Menu : from n/a through 6.0.0.
Title WordPress FW Food Menu plugin <= 6.0.0 - Arbitrary File Upload Vulnerability WordPress FW Food Menu <= 6.0.0 - Arbitrary File Upload Vulnerability
References

Thu, 23 Apr 2026 15:45:00 +0000


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in Fastw3b LLC FW Food Menu allows Using Malicious Files. This issue affects FW Food Menu : from n/a through 6.0.0. Unrestricted Upload of File with Dangerous Type vulnerability in Fastw3b LLC FW Food Menu fw-food-menu allows Using Malicious Files.This issue affects FW Food Menu : from n/a through <= 6.0.0.
Title WordPress FW Food Menu <= 6.0.0 - Arbitrary File Upload Vulnerability WordPress FW Food Menu plugin <= 6.0.0 - Arbitrary File Upload Vulnerability
References

Tue, 17 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in Fastw3b LLC FW Food Menu allows Using Malicious Files. This issue affects FW Food Menu : from n/a through 6.0.0.
Title WordPress FW Food Menu <= 6.0.0 - Arbitrary File Upload Vulnerability
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Fastw3b Fw Food Menu Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:04.903Z

Reserved: 2025-06-04T15:44:57.576Z

Link: CVE-2025-49447

cve-icon Vulnrichment

Updated: 2025-06-17T15:48:39.701Z

cve-icon NVD

Status : Deferred

Published: 2025-06-17T15:15:49.273

Modified: 2026-04-28T19:33:08.020

Link: CVE-2025-49447

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T11:45:21Z

Weaknesses