Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11704: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in impacttechlab Elegance Menu

0
High
VulnerabilityCVE-2025-11704cvecve-2025-11704cwe-98
Published: Tue Nov 04 2025 (11/04/2025, 04:27:20 UTC)
Source: CVE Database V5
Vendor/Project: impacttechlab
Product: Elegance Menu

Description

The Elegance Menu plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.9 via the 'elegance-menu' attribute of the `elegance-menu` shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

AI-Powered Analysis

AILast updated: 11/04/2025, 04:54:29 UTC

Technical Analysis

CVE-2025-11704 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Elegance Menu plugin for WordPress developed by impacttechlab. The vulnerability exists in all versions up to and including 1.9 and is triggered through the 'elegance-menu' attribute of the 'elegance-menu' shortcode. Authenticated users with Contributor-level access or higher can manipulate this attribute to include arbitrary PHP files from the server, leading to remote code execution. This occurs because the plugin improperly controls the filename used in include/require statements, failing to validate or sanitize input properly. Exploiting this vulnerability allows attackers to execute arbitrary PHP code, bypass access controls, and potentially access or modify sensitive data stored on the server. The attack vector is network-based, requiring authentication but no additional user interaction. The CVSS v3.1 score of 7.5 indicates high severity, with attack complexity rated high due to the need for authenticated access but with significant impacts on confidentiality, integrity, and availability. No patches or fixes are currently published, and no known exploits have been observed in the wild. The vulnerability poses a serious risk to WordPress sites using this plugin, especially those with multiple contributors or less restrictive user role management.

Potential Impact

For European organizations, this vulnerability presents a significant threat to WordPress-based websites that utilize the Elegance Menu plugin. Successful exploitation can lead to full server compromise, allowing attackers to execute arbitrary PHP code, access sensitive data, and bypass existing access controls. This can result in data breaches, defacement, or use of compromised servers as pivot points for further attacks within the network. Organizations relying on Contributor-level user roles for content management are particularly vulnerable, as these roles are sufficient to exploit the flaw. The impact extends to the availability of web services if attackers deploy malicious scripts or ransomware. Given the widespread use of WordPress across Europe, especially in SMEs and public sector websites, the vulnerability could disrupt business operations, damage reputations, and lead to regulatory non-compliance under GDPR if personal data is exposed.

Mitigation Recommendations

1. Immediately restrict Contributor-level user permissions to prevent untrusted users from uploading or including arbitrary files. 2. Implement strict file upload controls and scanning to prevent uploading of malicious PHP files. 3. Monitor and audit usage of the 'elegance-menu' shortcode and related attributes for suspicious activity. 4. Apply web application firewall (WAF) rules to detect and block attempts to exploit this LFI vulnerability. 5. Disable or remove the Elegance Menu plugin if not essential until a patch is released. 6. Follow impacttechlab and WordPress security advisories closely for updates or patches and apply them promptly. 7. Conduct regular security assessments and penetration testing focusing on plugin vulnerabilities and user role configurations. 8. Educate content contributors about the risks of uploading executable files and enforce strict content policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-13T19:10:53.316Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690984dc2b77ca42b4883e54

Added to database: 11/4/2025, 4:45:16 AM

Last enriched: 11/4/2025, 4:54:29 AM

Last updated: 11/5/2025, 1:03:47 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats