CVE-2025-49914: Exposure of Sensitive System Information to an Unauthorized Control Sphere in jetmonsters Restaurant Menu by MotoPress
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in jetmonsters Restaurant Menu by MotoPress mp-restaurant-menu allows Retrieve Embedded Sensitive Data.This issue affects Restaurant Menu by MotoPress: from n/a through <= 2.4.7.
AI Analysis
Technical Summary
CVE-2025-49914 is a vulnerability identified in the jetmonsters Restaurant Menu by MotoPress WordPress plugin, affecting all versions up to and including 2.4.7. The flaw allows an attacker with at least limited privileges (PR:L) to remotely retrieve embedded sensitive system information without requiring user interaction (UI:N). The vulnerability is classified as an exposure of sensitive system information to an unauthorized control sphere, meaning that data intended to be protected within the system is accessible to unauthorized users. The CVSS v3.1 base score is 6.5, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. This means the attack can be performed remotely over the network with low attack complexity, requires some privileges but no user interaction, and impacts confidentiality significantly, while integrity and availability remain unaffected. The sensitive information exposed could include configuration details, credentials, or other embedded data that could facilitate further exploitation or lateral movement within the environment. No known exploits are currently reported in the wild, and no official patches have been released at the time of publication. The vulnerability was reserved in June 2025 and published in December 2025. The affected plugin is commonly used in WordPress-based restaurant websites to manage menus, making it a target for attackers seeking to gather intelligence or escalate privileges.
Potential Impact
For European organizations, particularly those in the hospitality and restaurant sectors using WordPress with the jetmonsters Restaurant Menu by MotoPress plugin, this vulnerability poses a risk of sensitive data leakage. Exposure of embedded sensitive system information can lead to unauthorized disclosure of configuration details, API keys, or credentials, which attackers could leverage for further attacks such as privilege escalation, data theft, or lateral movement within the network. While the vulnerability does not directly compromise system integrity or availability, the confidentiality breach can have significant reputational and operational impacts, especially under stringent data protection regulations like GDPR. Organizations relying on this plugin for their online presence may face increased risk of targeted attacks, data breaches, or compliance violations if the vulnerability is exploited. The medium severity rating suggests a moderate but non-negligible threat level, warranting timely mitigation to prevent escalation.
Mitigation Recommendations
1. Immediately restrict access to the jetmonsters Restaurant Menu plugin’s administrative and configuration interfaces to trusted users only, employing role-based access controls to minimize privilege exposure. 2. Monitor web server and application logs for unusual access patterns or attempts to retrieve sensitive data from the plugin endpoints. 3. Disable or remove the plugin if it is not essential to reduce the attack surface. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the plugin’s known vulnerable components. 5. Stay informed about official patches or updates from MotoPress and apply them promptly once released. 6. Conduct a thorough audit of exposed data to identify any leaked credentials or sensitive information and rotate or revoke them as necessary. 7. Educate site administrators about the risks and ensure that principle of least privilege is enforced across all WordPress plugins and user accounts. 8. Consider deploying security plugins that can detect and alert on anomalous plugin behavior or unauthorized data access attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-49914: Exposure of Sensitive System Information to an Unauthorized Control Sphere in jetmonsters Restaurant Menu by MotoPress
Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in jetmonsters Restaurant Menu by MotoPress mp-restaurant-menu allows Retrieve Embedded Sensitive Data.This issue affects Restaurant Menu by MotoPress: from n/a through <= 2.4.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-49914 is a vulnerability identified in the jetmonsters Restaurant Menu by MotoPress WordPress plugin, affecting all versions up to and including 2.4.7. The flaw allows an attacker with at least limited privileges (PR:L) to remotely retrieve embedded sensitive system information without requiring user interaction (UI:N). The vulnerability is classified as an exposure of sensitive system information to an unauthorized control sphere, meaning that data intended to be protected within the system is accessible to unauthorized users. The CVSS v3.1 base score is 6.5, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. This means the attack can be performed remotely over the network with low attack complexity, requires some privileges but no user interaction, and impacts confidentiality significantly, while integrity and availability remain unaffected. The sensitive information exposed could include configuration details, credentials, or other embedded data that could facilitate further exploitation or lateral movement within the environment. No known exploits are currently reported in the wild, and no official patches have been released at the time of publication. The vulnerability was reserved in June 2025 and published in December 2025. The affected plugin is commonly used in WordPress-based restaurant websites to manage menus, making it a target for attackers seeking to gather intelligence or escalate privileges.
Potential Impact
For European organizations, particularly those in the hospitality and restaurant sectors using WordPress with the jetmonsters Restaurant Menu by MotoPress plugin, this vulnerability poses a risk of sensitive data leakage. Exposure of embedded sensitive system information can lead to unauthorized disclosure of configuration details, API keys, or credentials, which attackers could leverage for further attacks such as privilege escalation, data theft, or lateral movement within the network. While the vulnerability does not directly compromise system integrity or availability, the confidentiality breach can have significant reputational and operational impacts, especially under stringent data protection regulations like GDPR. Organizations relying on this plugin for their online presence may face increased risk of targeted attacks, data breaches, or compliance violations if the vulnerability is exploited. The medium severity rating suggests a moderate but non-negligible threat level, warranting timely mitigation to prevent escalation.
Mitigation Recommendations
1. Immediately restrict access to the jetmonsters Restaurant Menu plugin’s administrative and configuration interfaces to trusted users only, employing role-based access controls to minimize privilege exposure. 2. Monitor web server and application logs for unusual access patterns or attempts to retrieve sensitive data from the plugin endpoints. 3. Disable or remove the plugin if it is not essential to reduce the attack surface. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the plugin’s known vulnerable components. 5. Stay informed about official patches or updates from MotoPress and apply them promptly once released. 6. Conduct a thorough audit of exposed data to identify any leaked credentials or sensitive information and rotate or revoke them as necessary. 7. Educate site administrators about the risks and ensure that principle of least privilege is enforced across all WordPress plugins and user accounts. 8. Consider deploying security plugins that can detect and alert on anomalous plugin behavior or unauthorized data access attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-11T16:06:59.982Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b0394eb3efac366ff1ff
Added to database: 12/18/2025, 7:41:45 AM
Last enriched: 1/20/2026, 8:11:39 PM
Last updated: 2/7/2026, 8:57:16 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2111: Path Traversal in JeecgBoot
MediumCVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.