Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62642: CWE-862 Missing Authorization in Restaurant Brands International assistant platform

0
Medium
VulnerabilityCVE-2025-62642cvecve-2025-62642cwe-862
Published: Fri Oct 17 2025 (10/17/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Restaurant Brands International
Product: assistant platform

Description

The Restaurant Brands International (RBI) assistant platform through 2025-09-06 has an "Anyone Can Join This Party" signup API that does not verify user account creation, allowing a remote unauthenticated attacker to create a user account.

AI-Powered Analysis

AILast updated: 10/17/2025, 21:03:32 UTC

Technical Analysis

CVE-2025-62642 identifies a missing authorization vulnerability (CWE-862) in the Restaurant Brands International assistant platform, specifically in its signup API dubbed "Anyone Can Join This Party." This API fails to verify or authenticate user account creation requests, allowing any remote attacker to create user accounts without prior authorization or authentication. The vulnerability affects all versions up to 2025-09-06, with no patches currently available. The CVSS 3.1 base score is 5.8 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the security scope of the vulnerable component. This flaw could be exploited to create fraudulent accounts, potentially enabling attackers to abuse platform features, escalate privileges, or conduct further attacks such as phishing or social engineering. Although no known exploits are reported in the wild, the vulnerability’s presence in a widely used restaurant assistant platform raises concerns about potential misuse. The lack of authorization checks on account creation is a fundamental security oversight that undermines the platform’s trust model and user management controls.

Potential Impact

For European organizations, especially those operating or partnering with Restaurant Brands International or using its assistant platform, this vulnerability could lead to unauthorized account creation, undermining user trust and platform integrity. Fraudulent accounts might be used to manipulate loyalty programs, place unauthorized orders, or conduct social engineering attacks against legitimate users. This could result in financial losses, reputational damage, and increased operational costs due to fraud mitigation efforts. Additionally, attackers could leverage these unauthorized accounts as footholds for further attacks within the platform or associated systems. Given the platform’s role in customer interaction and order management, integrity issues could disrupt business processes. The impact is more pronounced in countries with high adoption of digital restaurant services and RBI’s market presence, where exploitation could affect a large user base and critical business operations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement strict authorization and validation controls on the signup API to ensure only legitimate users can create accounts. This includes adding CAPTCHA challenges, email or phone verification, and rate limiting to prevent automated or bulk account creation. Monitoring and alerting on unusual signup patterns or spikes in account creation can help detect exploitation attempts early. Organizations should engage with Restaurant Brands International to obtain patches or updates addressing this issue and apply them promptly once available. Additionally, reviewing and tightening access controls and user privilege management within the platform can limit the potential damage from unauthorized accounts. Employing multi-factor authentication for sensitive actions and conducting regular security audits of user management APIs will further reduce risk. Finally, educating users and staff about potential social engineering risks stemming from fraudulent accounts can enhance overall security posture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-10-17T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f2ab359c34d0947f42a458

Added to database: 10/17/2025, 8:46:45 PM

Last enriched: 10/17/2025, 9:03:32 PM

Last updated: 10/20/2025, 11:37:58 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats