Skip to main content

CVE-2025-49447: CWE-434 Unrestricted Upload of File with Dangerous Type in Fastw3b LLC FW Food Menu

Critical
VulnerabilityCVE-2025-49447cvecve-2025-49447cwe-434
Published: Tue Jun 17 2025 (06/17/2025, 15:01:10 UTC)
Source: CVE Database V5
Vendor/Project: Fastw3b LLC
Product: FW Food Menu

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Fastw3b LLC FW Food Menu allows Using Malicious Files. This issue affects FW Food Menu : from n/a through 6.0.0.

AI-Powered Analysis

AILast updated: 06/17/2025, 15:35:56 UTC

Technical Analysis

CVE-2025-49447 is a critical vulnerability identified in the FW Food Menu product developed by Fastw3b LLC. The vulnerability is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This flaw allows an attacker to upload malicious files without proper validation or restriction, potentially leading to severe consequences. The vulnerability affects all versions up to and including version 6.0.0, with no specific version exclusions noted. The CVSS v3.1 base score is 10.0, indicating a critical severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) reveals that the attack can be executed remotely over the network without any authentication or user interaction, requires low attack complexity, and impacts confidentiality, integrity, and availability with a scope change. In practical terms, an attacker can upload executable or script files that the server might process or execute, leading to full system compromise, data theft, data manipulation, or denial of service. The vulnerability's unrestricted file upload nature means that it can be exploited to deploy web shells, ransomware, or other malicious payloads, making it a highly attractive target for threat actors. No known exploits in the wild have been reported yet, but the critical nature and ease of exploitation suggest that exploitation attempts may emerge rapidly after disclosure. The absence of available patches at the time of publication increases the urgency for mitigation and monitoring.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those in the hospitality, food service, and retail sectors that utilize FW Food Menu software to manage digital menus and ordering systems. Exploitation could lead to unauthorized access to sensitive customer data, including payment information, personal details, and order histories, violating GDPR and other data protection regulations. The integrity of menu data and pricing could be manipulated, causing financial losses and reputational damage. Availability impacts could disrupt business operations, leading to downtime in ordering systems and loss of revenue. Additionally, compromised systems could be leveraged as pivot points for broader network intrusions, affecting supply chain partners and internal corporate networks. Given the criticality and remote exploitability without authentication, attackers could target multiple organizations simultaneously, amplifying the threat landscape across Europe. The potential for data breaches also raises regulatory and compliance risks, including fines and legal consequences under European data protection laws.

Mitigation Recommendations

1. Immediate implementation of strict file upload validation controls: restrict allowed file types to only those necessary (e.g., images in specific formats), enforce MIME type checks, and validate file contents server-side. 2. Deploy web application firewalls (WAFs) with custom rules to detect and block attempts to upload executable or script files. 3. Isolate the upload directory from execution privileges by configuring the web server to prevent execution of uploaded files, using techniques such as disabling script execution in upload folders. 4. Monitor logs for unusual file upload activity and implement alerting mechanisms for suspicious patterns. 5. Conduct thorough code reviews and penetration testing focused on file upload functionality. 6. Engage with Fastw3b LLC for timely patch releases and apply updates as soon as they become available. 7. Employ network segmentation to limit the impact of a potential compromise originating from the FW Food Menu system. 8. Educate IT and security teams about this vulnerability to ensure rapid response to any exploitation attempts. 9. Consider temporary disabling of file upload features if feasible until patches or mitigations are in place.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T15:44:57.576Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68518789a8c921274385df68

Added to database: 6/17/2025, 3:19:37 PM

Last enriched: 6/17/2025, 3:35:56 PM

Last updated: 8/18/2025, 11:33:38 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats