Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69387: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in whatwouldjessedo Simple Retail Menus

0
High
VulnerabilityCVE-2025-69387cvecve-2025-69387
Published: Fri Feb 20 2026 (02/20/2026, 15:46:54 UTC)
Source: CVE Database V5
Vendor/Project: whatwouldjessedo
Product: Simple Retail Menus

Description

CVE-2025-69387 is a vulnerability in the Simple Retail Menus plugin by whatwouldjessedo that allows improper control of filenames used in PHP include or require statements, leading to a Local File Inclusion (LFI) issue. This flaw affects versions up to and including 4. 2. 1. Exploiting this vulnerability could allow attackers to include arbitrary files from the server, potentially exposing sensitive data or enabling further code execution. No known public exploits currently exist, and no CVSS score has been assigned. The vulnerability arises from insufficient validation or sanitization of user-supplied input controlling file inclusion. Organizations using this plugin on PHP-based web servers are at risk, especially if the plugin is exposed to untrusted input. Mitigation requires applying patches once available or implementing strict input validation and disabling remote file inclusion in PHP configurations. Countries with significant e-commerce activity and widespread WordPress or PHP CMS usage are most likely impacted.

AI-Powered Analysis

AILast updated: 02/20/2026, 21:44:59 UTC

Technical Analysis

CVE-2025-69387 identifies a Local File Inclusion (LFI) vulnerability in the Simple Retail Menus plugin developed by whatwouldjessedo, affecting versions up to and including 4.2.1. The vulnerability stems from improper control over the filename parameter used in PHP include or require statements. This flaw allows an attacker to manipulate the input that determines which file is included, potentially enabling the inclusion of arbitrary local files on the server. Such an inclusion can lead to disclosure of sensitive files (e.g., configuration files, password files), execution of malicious code if combined with other vulnerabilities or writable files, and ultimately full server compromise. The vulnerability is classified as a PHP Remote File Inclusion type but is specifically a Local File Inclusion since the description references local file inclusion. No CVSS score has been assigned yet, and no public exploits have been reported to date. The vulnerability affects web servers running the vulnerable plugin, typically WordPress sites using Simple Retail Menus for e-commerce or retail menu management. The attack vector usually involves sending crafted HTTP requests with manipulated parameters controlling the include path. The lack of proper input sanitization and validation in the plugin's codebase is the root cause. Because the plugin is widely used in retail and e-commerce websites, exploitation could have significant consequences. The vulnerability was published in early 2026, with the issue reserved at the end of 2025. No patches or fixes are linked yet, indicating that users should be cautious and monitor for updates. The vulnerability's impact is heightened by the fact that PHP include/require statements are critical for code execution flow, and improper control can lead to severe security breaches.

Potential Impact

The impact of CVE-2025-69387 is substantial for organizations using the Simple Retail Menus plugin, especially those running WordPress-based e-commerce or retail websites. Successful exploitation can lead to unauthorized disclosure of sensitive server files, including configuration files containing database credentials or API keys, which can facilitate further attacks. Additionally, attackers might execute arbitrary PHP code if they can include files with malicious payloads or leverage writable files, leading to full server compromise. This can result in data breaches, defacement, service disruption, or use of compromised servers for further attacks such as phishing or malware distribution. The vulnerability could also undermine customer trust and lead to regulatory penalties if sensitive customer data is exposed. Since the plugin is used in retail contexts, the financial and reputational damage could be significant. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, as attackers often develop exploits rapidly once a vulnerability is public. Organizations with internet-facing web servers hosting the vulnerable plugin are at the highest risk. The scope includes all installations of Simple Retail Menus up to version 4.2.1, potentially affecting thousands of websites globally.

Mitigation Recommendations

To mitigate CVE-2025-69387, organizations should immediately audit their use of the Simple Retail Menus plugin and identify affected versions. Until an official patch is released, consider the following specific actions: 1) Implement strict input validation and sanitization on all parameters that control file inclusion, ensuring only expected filenames or paths are accepted. 2) Employ PHP configuration directives such as open_basedir to restrict PHP file operations to designated directories, preventing inclusion of arbitrary files outside allowed paths. 3) Disable or restrict the use of PHP functions like include, require, include_once, and require_once if possible or replace dynamic includes with static code paths. 4) Use web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts or anomalous HTTP requests targeting the vulnerable plugin. 5) Monitor server logs for unusual access patterns or errors related to file inclusion. 6) Isolate the web server environment using containerization or sandboxing to limit the impact of potential exploitation. 7) Regularly back up website data and configurations to enable recovery in case of compromise. 8) Stay updated with vendor announcements and apply official patches promptly once available. 9) If feasible, temporarily disable or remove the plugin until a fix is applied, especially on high-risk or critical systems. These targeted mitigations go beyond generic advice by focusing on PHP-specific controls and plugin usage context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-31T20:13:11.108Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998c9fbbe58cf853bab8d74

Added to database: 2/20/2026, 8:54:19 PM

Last enriched: 2/20/2026, 9:44:59 PM

Last updated: 2/21/2026, 6:28:16 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats