CVE-2025-11704: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in impacttechlab Elegance Menu
The Elegance Menu plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.9 via the 'elegance-menu' attribute of the `elegance-menu` shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
AI Analysis
Technical Summary
CVE-2025-11704 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Elegance Menu plugin for WordPress developed by impacttechlab. The vulnerability exists in all versions up to and including 1.9 and is triggered through the 'elegance-menu' attribute of the 'elegance-menu' shortcode. Authenticated users with Contributor-level access or higher can manipulate this attribute to include arbitrary PHP files from the server, leading to remote code execution. This occurs because the plugin improperly controls the filename used in include/require statements, failing to validate or sanitize input properly. Exploiting this vulnerability allows attackers to execute arbitrary PHP code, bypass access controls, and potentially access or modify sensitive data stored on the server. The attack vector is network-based, requiring authentication but no additional user interaction. The CVSS v3.1 score of 7.5 indicates high severity, with attack complexity rated high due to the need for authenticated access but with significant impacts on confidentiality, integrity, and availability. No patches or fixes are currently published, and no known exploits have been observed in the wild. The vulnerability poses a serious risk to WordPress sites using this plugin, especially those with multiple contributors or less restrictive user role management.
Potential Impact
For European organizations, this vulnerability presents a significant threat to WordPress-based websites that utilize the Elegance Menu plugin. Successful exploitation can lead to full server compromise, allowing attackers to execute arbitrary PHP code, access sensitive data, and bypass existing access controls. This can result in data breaches, defacement, or use of compromised servers as pivot points for further attacks within the network. Organizations relying on Contributor-level user roles for content management are particularly vulnerable, as these roles are sufficient to exploit the flaw. The impact extends to the availability of web services if attackers deploy malicious scripts or ransomware. Given the widespread use of WordPress across Europe, especially in SMEs and public sector websites, the vulnerability could disrupt business operations, damage reputations, and lead to regulatory non-compliance under GDPR if personal data is exposed.
Mitigation Recommendations
1. Immediately restrict Contributor-level user permissions to prevent untrusted users from uploading or including arbitrary files. 2. Implement strict file upload controls and scanning to prevent uploading of malicious PHP files. 3. Monitor and audit usage of the 'elegance-menu' shortcode and related attributes for suspicious activity. 4. Apply web application firewall (WAF) rules to detect and block attempts to exploit this LFI vulnerability. 5. Disable or remove the Elegance Menu plugin if not essential until a patch is released. 6. Follow impacttechlab and WordPress security advisories closely for updates or patches and apply them promptly. 7. Conduct regular security assessments and penetration testing focusing on plugin vulnerabilities and user role configurations. 8. Educate content contributors about the risks of uploading executable files and enforce strict content policies.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-11704: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in impacttechlab Elegance Menu
Description
The Elegance Menu plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.9 via the 'elegance-menu' attribute of the `elegance-menu` shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
AI-Powered Analysis
Technical Analysis
CVE-2025-11704 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Elegance Menu plugin for WordPress developed by impacttechlab. The vulnerability exists in all versions up to and including 1.9 and is triggered through the 'elegance-menu' attribute of the 'elegance-menu' shortcode. Authenticated users with Contributor-level access or higher can manipulate this attribute to include arbitrary PHP files from the server, leading to remote code execution. This occurs because the plugin improperly controls the filename used in include/require statements, failing to validate or sanitize input properly. Exploiting this vulnerability allows attackers to execute arbitrary PHP code, bypass access controls, and potentially access or modify sensitive data stored on the server. The attack vector is network-based, requiring authentication but no additional user interaction. The CVSS v3.1 score of 7.5 indicates high severity, with attack complexity rated high due to the need for authenticated access but with significant impacts on confidentiality, integrity, and availability. No patches or fixes are currently published, and no known exploits have been observed in the wild. The vulnerability poses a serious risk to WordPress sites using this plugin, especially those with multiple contributors or less restrictive user role management.
Potential Impact
For European organizations, this vulnerability presents a significant threat to WordPress-based websites that utilize the Elegance Menu plugin. Successful exploitation can lead to full server compromise, allowing attackers to execute arbitrary PHP code, access sensitive data, and bypass existing access controls. This can result in data breaches, defacement, or use of compromised servers as pivot points for further attacks within the network. Organizations relying on Contributor-level user roles for content management are particularly vulnerable, as these roles are sufficient to exploit the flaw. The impact extends to the availability of web services if attackers deploy malicious scripts or ransomware. Given the widespread use of WordPress across Europe, especially in SMEs and public sector websites, the vulnerability could disrupt business operations, damage reputations, and lead to regulatory non-compliance under GDPR if personal data is exposed.
Mitigation Recommendations
1. Immediately restrict Contributor-level user permissions to prevent untrusted users from uploading or including arbitrary files. 2. Implement strict file upload controls and scanning to prevent uploading of malicious PHP files. 3. Monitor and audit usage of the 'elegance-menu' shortcode and related attributes for suspicious activity. 4. Apply web application firewall (WAF) rules to detect and block attempts to exploit this LFI vulnerability. 5. Disable or remove the Elegance Menu plugin if not essential until a patch is released. 6. Follow impacttechlab and WordPress security advisories closely for updates or patches and apply them promptly. 7. Conduct regular security assessments and penetration testing focusing on plugin vulnerabilities and user role configurations. 8. Educate content contributors about the risks of uploading executable files and enforce strict content policies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-13T19:10:53.316Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690984dc2b77ca42b4883e54
Added to database: 11/4/2025, 4:45:16 AM
Last enriched: 11/4/2025, 4:54:29 AM
Last updated: 11/5/2025, 1:03:47 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumCVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server
UnknownCVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumCVE-2025-12468: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.