Skip to main content

CVE-2025-48149: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in dedalx Cook&Meal

High
VulnerabilityCVE-2025-48149cvecve-2025-48149cwe-98
Published: Wed Aug 20 2025 (08/20/2025, 08:03:33 UTC)
Source: CVE Database V5
Vendor/Project: dedalx
Product: Cook&Meal

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in dedalx Cook&Meal allows PHP Local File Inclusion. This issue affects Cook&Meal: from n/a through 1.2.3.

AI-Powered Analysis

AILast updated: 08/20/2025, 10:03:29 UTC

Technical Analysis

CVE-2025-48149 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP applications. Specifically, this vulnerability affects the dedalx Cook&Meal product up to version 1.2.3. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the filename parameter used in include or require statements to execute arbitrary local files on the server. This can lead to remote code execution if an attacker can control or upload files to the server, or can escalate to full system compromise by including sensitive files such as configuration files, password stores, or logs. The CVSS v3.1 score of 8.1 reflects a high impact on confidentiality, integrity, and availability, with network attack vector, no privileges required, no user interaction, but high attack complexity. The vulnerability arises from insufficient validation or sanitization of user-supplied input used in PHP include/require statements, enabling attackers to traverse directories or specify unintended files. Although no known exploits are currently reported in the wild, the nature of the vulnerability and its high CVSS score indicate a significant risk if left unpatched. The absence of available patches at the time of publication suggests that affected users should prioritize mitigation and monitoring. Given that Cook&Meal is a PHP-based application, the vulnerability could be exploited remotely over the network, making it a critical concern for web-facing deployments.

Potential Impact

For European organizations using dedalx Cook&Meal, this vulnerability poses a serious threat to the confidentiality and integrity of their data and systems. Successful exploitation could allow attackers to access sensitive internal files, execute arbitrary code, and potentially take full control of affected servers. This could lead to data breaches involving personal data protected under GDPR, causing legal and financial repercussions. Additionally, service disruption or defacement could damage organizational reputation. Since the vulnerability requires no authentication or user interaction, attackers can attempt exploitation at scale, increasing the risk of widespread compromise. Organizations in sectors such as hospitality, food service, or any industry using Cook&Meal for operational purposes in Europe could face operational downtime and data loss. The high attack complexity somewhat limits exploitation to skilled attackers, but the network vector and lack of required privileges mean that motivated threat actors, including cybercriminals or state-sponsored groups, could leverage this vulnerability for espionage or sabotage.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the affected Cook&Meal application via network controls such as web application firewalls (WAFs) and IP whitelisting to limit exposure to untrusted networks. 2. Implement strict input validation and sanitization on all parameters used in include/require statements to prevent directory traversal or arbitrary file inclusion. 3. Disable PHP functions that allow dynamic file inclusion if not necessary, such as 'allow_url_include' and 'allow_url_fopen' in php.ini. 4. Monitor web server and application logs for suspicious requests attempting to manipulate include parameters or access unusual files. 5. Isolate the application environment with minimal privileges and use containerization or sandboxing to limit impact if exploitation occurs. 6. Engage with dedalx for official patches or updates and apply them promptly once available. 7. Conduct a thorough security review of all PHP code handling file includes to identify and remediate similar issues. 8. Educate developers and administrators on secure coding practices related to file inclusion and input handling.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T18:01:53.424Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a584b3ad5a09ad0002e294

Added to database: 8/20/2025, 8:17:55 AM

Last enriched: 8/20/2025, 10:03:29 AM

Last updated: 8/27/2025, 12:34:26 AM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats