Cyber Posture

CVE-2025-30846

High

Published: 27 March 2025

Published
27 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0241 85.2th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-30846 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 14.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2025-30846 by identifying, prioritizing, and applying patches or updates to vulnerable versions of the mp-restaurant-menu WordPress plugin.

prevent

Requires validation of untrusted filename inputs to PHP include/require statements, preventing local file inclusion exploitation in the plugin.

prevent

Enforces secure configuration settings for PHP environments, such as open_basedir restrictions, to limit the scope of local file access during LFI attempts.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

LFI in public-facing WordPress plugin enables exploitation of the app (T1190), direct local file access (T1005), and arbitrary code execution via PHP include (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in jetmonsters Restaurant Menu by MotoPress mp-restaurant-menu allows PHP Local File Inclusion.This issue affects Restaurant Menu by MotoPress: from n/a through <= 2.4.4.

Deeper analysisAI

CVE-2025-30846 is a PHP Local File Inclusion vulnerability, stemming from improper control of filename for include/require statements (CWE-98), in the Restaurant Menu by MotoPress WordPress plugin (mp-restaurant-menu). The flaw affects all versions from n/a through 2.4.4 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

The vulnerability can be exploited by a low-privileged authenticated user over the network with low attack complexity and no user interaction required. Successful exploitation enables high-impact outcomes, including unauthorized access to sensitive local files, potential arbitrary code execution via PHP inclusion, and disruption of confidentiality, integrity, and availability.

Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/mp-restaurant-menu/vulnerability/wordpress-restaurant-menu-by-motopress-plugin-2-4-4-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

CVEs Like This One

CVE-2025-30829Shared CWE-98
CVE-2024-13790Shared CWE-98
CVE-2026-32384Shared CWE-98
CVE-2026-22389Shared CWE-98
CVE-2025-69040Shared CWE-98
CVE-2025-69037Shared CWE-98
CVE-2026-25464Shared CWE-98
CVE-2026-22516Shared CWE-98
CVE-2025-53447Shared CWE-98
CVE-2025-22509Shared CWE-98

References