Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1928: CWE-307 Improper Restriction of Excessive Authentication Attempts in Restajet Information Technologies Inc. Online Food Delivery System

0
Critical
VulnerabilityCVE-2025-1928cvecve-2025-1928cwe-307
Published: Fri Dec 19 2025 (12/19/2025, 12:08:35 UTC)
Source: CVE Database V5
Vendor/Project: Restajet Information Technologies Inc.
Product: Online Food Delivery System

Description

Improper Restriction of Excessive Authentication Attempts vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Password Recovery Exploitation.This issue affects Online Food Delivery System: through 19122025. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 18:46:25 UTC

Technical Analysis

CVE-2025-1928 identifies a critical security vulnerability in the Online Food Delivery System developed by Restajet Information Technologies Inc. The root cause is an improper restriction of excessive authentication attempts (CWE-307), specifically affecting the password recovery mechanism. This vulnerability allows an unauthenticated attacker to repeatedly attempt password recovery operations without any throttling or lockout, facilitating brute force or credential stuffing attacks to gain unauthorized access to user accounts. The vulnerability is remotely exploitable over the network, requires no privileges or user interaction, and impacts confidentiality and integrity of user data. The CVSS v3.1 score of 9.1 reflects the ease of exploitation combined with the severe consequences of account compromise, including potential data theft and unauthorized transactions. The vendor was notified but has not responded or provided patches, leaving systems exposed. The affected product version is indicated as '0', which likely means all current versions up to the publication date are vulnerable. No known exploits have been reported in the wild yet, but the absence of mitigation increases the risk of future exploitation. This vulnerability is particularly concerning for organizations relying on this platform for online food delivery services, as compromised accounts could lead to fraud, privacy violations, and reputational damage.

Potential Impact

The impact of CVE-2025-1928 is significant for organizations using the Restajet Online Food Delivery System. Successful exploitation can lead to unauthorized access to user accounts via password recovery abuse, compromising user confidentiality and integrity of account data. Attackers could potentially access personal information, order histories, payment details, and manipulate orders or transactions. This can result in financial losses, privacy breaches, and erosion of customer trust. The lack of authentication or user interaction requirements lowers the barrier for attackers, increasing the likelihood of widespread exploitation. Additionally, organizations may face regulatory penalties for failing to protect user data adequately. The absence of vendor patches prolongs exposure, increasing the window for attackers to develop and deploy exploits. Given the critical nature of the vulnerability, the threat extends beyond individual users to the operational integrity and reputation of affected businesses.

Mitigation Recommendations

To mitigate CVE-2025-1928, organizations should implement immediate compensating controls since no official patches are available. These include: 1) Deploying rate limiting on password recovery endpoints to restrict the number of attempts per IP address or user account within a defined timeframe. 2) Enforcing account lockout policies after a configurable number of failed recovery attempts to prevent brute force attacks. 3) Implementing CAPTCHA or other challenge-response tests on password recovery forms to deter automated abuse. 4) Monitoring authentication and password recovery logs for anomalous patterns indicative of attack attempts. 5) Encouraging users to enable multi-factor authentication (MFA) where possible to reduce the impact of compromised credentials. 6) Segregating and securing sensitive user data to minimize damage in case of account compromise. 7) Engaging with the vendor for updates and applying patches promptly once available. 8) Conducting regular security assessments and penetration testing focused on authentication mechanisms. These measures collectively reduce the risk of exploitation and limit potential damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-03-04T11:45:39.525Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6945440aa90e3c9a152fb9c6

Added to database: 12/19/2025, 12:24:42 PM

Last enriched: 3/26/2026, 6:46:25 PM

Last updated: 5/8/2026, 4:55:58 PM

Views: 214

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses