Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49914: Exposure of Sensitive System Information to an Unauthorized Control Sphere in jetmonsters Restaurant Menu by MotoPress

0
Medium
VulnerabilityCVE-2025-49914cvecve-2025-49914
Published: Thu Dec 18 2025 (12/18/2025, 07:21:43 UTC)
Source: CVE Database V5
Vendor/Project: jetmonsters
Product: Restaurant Menu by MotoPress

Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in jetmonsters Restaurant Menu by MotoPress mp-restaurant-menu allows Retrieve Embedded Sensitive Data.This issue affects Restaurant Menu by MotoPress: from n/a through <= 2.4.7.

AI-Powered Analysis

AILast updated: 12/18/2025, 09:47:00 UTC

Technical Analysis

CVE-2025-49914 is a vulnerability identified in the jetmonsters Restaurant Menu by MotoPress WordPress plugin, affecting all versions up to and including 2.4.7. The flaw allows an unauthorized control sphere—meaning an attacker without proper authentication—to retrieve embedded sensitive system information. This type of vulnerability typically arises from improper access control or information disclosure issues within the plugin’s code, potentially exposing configuration details, internal paths, or other sensitive data embedded in the plugin's files or responses. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged by attackers to gather intelligence about the target system, facilitating further attacks such as privilege escalation, targeted phishing, or exploitation of other vulnerabilities. The absence of a CVSS score indicates that the vulnerability is newly published and has not yet been fully assessed. The vulnerability affects a widely used plugin in the hospitality sector, which is often targeted due to the sensitive customer and business data handled. The technical details do not specify the exact nature of the sensitive data exposed, but given the plugin’s role, it may include system configuration or operational details that should remain confidential. The vulnerability was reserved in June 2025 and published in December 2025, indicating a recent discovery. Patch information is not yet available, so immediate mitigation relies on access control and monitoring.

Potential Impact

For European organizations, especially those in the hospitality and restaurant sectors using the jetmonsters Restaurant Menu by MotoPress plugin, this vulnerability could lead to unauthorized disclosure of sensitive system information. Such exposure can compromise confidentiality, enabling attackers to map the system environment, identify further vulnerabilities, or craft more effective attacks. This could result in data breaches, reputational damage, and potential regulatory non-compliance under GDPR if personal or sensitive customer data is indirectly exposed or if the vulnerability leads to subsequent data breaches. The impact on system integrity and availability is likely limited but cannot be ruled out if attackers leverage the information to escalate privileges or disrupt services. The vulnerability’s ease of exploitation without authentication increases the risk profile, making it accessible to a wide range of attackers, including opportunistic threat actors. European organizations with public-facing websites using this plugin are particularly vulnerable, and the risk is heightened if the plugin is not promptly updated or if compensating controls are not implemented.

Mitigation Recommendations

1. Monitor for and apply any official patches or updates released by MotoPress for the Restaurant Menu plugin immediately upon availability. 2. Until patches are available, restrict access to the plugin’s files and endpoints using web application firewalls (WAFs) or server-level access controls to prevent unauthorized retrieval of sensitive information. 3. Conduct a thorough audit of the web server and plugin configuration to identify and remove any embedded sensitive data that should not be publicly accessible. 4. Implement strict least-privilege principles for user roles managing the WordPress site to limit potential exploitation vectors. 5. Enable detailed logging and monitoring of web requests to detect unusual access patterns or attempts to access sensitive plugin resources. 6. Consider temporarily disabling the plugin if it is not critical to operations until a secure version is available. 7. Educate web administrators about the risks of information disclosure vulnerabilities and the importance of timely updates. 8. Review and enhance overall WordPress security posture, including regular backups and incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:06:59.982Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0394eb3efac366ff1ff

Added to database: 12/18/2025, 7:41:45 AM

Last enriched: 12/18/2025, 9:47:00 AM

Last updated: 12/19/2025, 7:53:37 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats