CVE-2025-62643: CWE-319 Cleartext Transmission of Sensitive Information in Restaurant Brands International assistant platform
The Restaurant Brands International (RBI) assistant platform through 2025-09-06 transmits passwords of user accounts in cleartext e-mail messages.
AI Analysis
Technical Summary
CVE-2025-62643 identifies a security vulnerability in the Restaurant Brands International (RBI) assistant platform, where passwords for user accounts are transmitted in cleartext within email messages. This practice violates secure communication principles and corresponds to CWE-319, which concerns the cleartext transmission of sensitive information. The vulnerability affects the platform through September 6, 2025, and was published on October 17, 2025. The CVSS v3.1 base score is 3.4, reflecting a low severity rating. The vector metrics indicate that exploitation requires adjacent network access (AV:A), high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and results in a confidentiality impact of low (C:L) with no integrity or availability impact. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. The core issue is that passwords are sent in plaintext emails, which can be intercepted by attackers with access to the email transmission path, such as insiders, network sniffers, or compromised mail servers. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability primarily threatens confidentiality of user credentials, potentially enabling unauthorized access if intercepted. This risk is heightened in environments where email encryption (e.g., TLS) is not enforced or where email accounts are compromised. The RBI assistant platform is used to support operations related to Restaurant Brands International, a global entity with franchise operations including Burger King, Tim Hortons, and Popeyes, which have a presence in multiple European countries. The vulnerability underscores the need for secure password handling and transmission practices, including avoiding sending passwords via email in plaintext and adopting secure password reset workflows.
Potential Impact
The primary impact of CVE-2025-62643 is the potential compromise of user account credentials due to interception of cleartext passwords transmitted via email. For European organizations using the RBI assistant platform, this could lead to unauthorized access to internal systems or user accounts, risking data confidentiality. Although the CVSS score is low, the exposure of passwords can facilitate further attacks such as account takeover, lateral movement, or fraud. The impact is mitigated somewhat by the requirement for adjacent network access and high attack complexity, limiting exploitation to attackers with network proximity or insider access. However, given the widespread use of email and potential weaknesses in email security configurations, the risk remains relevant. European franchises or subsidiaries of RBI may face reputational damage and operational disruption if credential compromise leads to broader security incidents. Additionally, GDPR considerations require protection of personal data, and leaking passwords via insecure channels could lead to regulatory scrutiny. The lack of integrity or availability impact reduces the risk of system disruption but does not diminish the importance of confidentiality protection. Overall, the threat is moderate in impact but should be addressed promptly to prevent escalation.
Mitigation Recommendations
To mitigate CVE-2025-62643, organizations should immediately cease the practice of transmitting passwords in cleartext emails. Instead, implement secure password reset mechanisms that use one-time tokens or links with expiration, avoiding direct password disclosure. Enforce encryption protocols such as TLS for all email transmissions to protect data in transit. Deploy email security solutions including SPF, DKIM, and DMARC to reduce the risk of email interception or spoofing. Conduct regular security awareness training for staff to recognize phishing and social engineering attempts that could exploit intercepted credentials. Monitor network traffic for unauthorized access attempts and implement network segmentation to limit adjacent network access. Engage with RBI or platform vendors to obtain patches or updates that address this vulnerability. Additionally, consider multi-factor authentication (MFA) to reduce the impact of compromised passwords. Review and audit all password handling and storage practices within the organization to ensure compliance with security best practices and regulatory requirements. Finally, maintain incident response readiness to quickly address any credential compromise events.
Affected Countries
United Kingdom, France, Germany, Spain, Italy, Netherlands, Belgium, Sweden
CVE-2025-62643: CWE-319 Cleartext Transmission of Sensitive Information in Restaurant Brands International assistant platform
Description
The Restaurant Brands International (RBI) assistant platform through 2025-09-06 transmits passwords of user accounts in cleartext e-mail messages.
AI-Powered Analysis
Technical Analysis
CVE-2025-62643 identifies a security vulnerability in the Restaurant Brands International (RBI) assistant platform, where passwords for user accounts are transmitted in cleartext within email messages. This practice violates secure communication principles and corresponds to CWE-319, which concerns the cleartext transmission of sensitive information. The vulnerability affects the platform through September 6, 2025, and was published on October 17, 2025. The CVSS v3.1 base score is 3.4, reflecting a low severity rating. The vector metrics indicate that exploitation requires adjacent network access (AV:A), high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and results in a confidentiality impact of low (C:L) with no integrity or availability impact. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. The core issue is that passwords are sent in plaintext emails, which can be intercepted by attackers with access to the email transmission path, such as insiders, network sniffers, or compromised mail servers. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability primarily threatens confidentiality of user credentials, potentially enabling unauthorized access if intercepted. This risk is heightened in environments where email encryption (e.g., TLS) is not enforced or where email accounts are compromised. The RBI assistant platform is used to support operations related to Restaurant Brands International, a global entity with franchise operations including Burger King, Tim Hortons, and Popeyes, which have a presence in multiple European countries. The vulnerability underscores the need for secure password handling and transmission practices, including avoiding sending passwords via email in plaintext and adopting secure password reset workflows.
Potential Impact
The primary impact of CVE-2025-62643 is the potential compromise of user account credentials due to interception of cleartext passwords transmitted via email. For European organizations using the RBI assistant platform, this could lead to unauthorized access to internal systems or user accounts, risking data confidentiality. Although the CVSS score is low, the exposure of passwords can facilitate further attacks such as account takeover, lateral movement, or fraud. The impact is mitigated somewhat by the requirement for adjacent network access and high attack complexity, limiting exploitation to attackers with network proximity or insider access. However, given the widespread use of email and potential weaknesses in email security configurations, the risk remains relevant. European franchises or subsidiaries of RBI may face reputational damage and operational disruption if credential compromise leads to broader security incidents. Additionally, GDPR considerations require protection of personal data, and leaking passwords via insecure channels could lead to regulatory scrutiny. The lack of integrity or availability impact reduces the risk of system disruption but does not diminish the importance of confidentiality protection. Overall, the threat is moderate in impact but should be addressed promptly to prevent escalation.
Mitigation Recommendations
To mitigate CVE-2025-62643, organizations should immediately cease the practice of transmitting passwords in cleartext emails. Instead, implement secure password reset mechanisms that use one-time tokens or links with expiration, avoiding direct password disclosure. Enforce encryption protocols such as TLS for all email transmissions to protect data in transit. Deploy email security solutions including SPF, DKIM, and DMARC to reduce the risk of email interception or spoofing. Conduct regular security awareness training for staff to recognize phishing and social engineering attempts that could exploit intercepted credentials. Monitor network traffic for unauthorized access attempts and implement network segmentation to limit adjacent network access. Engage with RBI or platform vendors to obtain patches or updates that address this vulnerability. Additionally, consider multi-factor authentication (MFA) to reduce the impact of compromised passwords. Review and audit all password handling and storage practices within the organization to ensure compliance with security best practices and regulatory requirements. Finally, maintain incident response readiness to quickly address any credential compromise events.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-17T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f2aebd9c34d0947f437b53
Added to database: 10/17/2025, 9:01:49 PM
Last enriched: 10/17/2025, 9:17:07 PM
Last updated: 10/19/2025, 6:17:16 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62672: CWE-770 Allocation of Resources Without Limits or Throttling in boyns rplay
MediumCVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownCVE-2025-11926: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdreams Related Posts Lite
MediumCVE-2025-9890: CWE-352 Cross-Site Request Forgery (CSRF) in mndpsingh287 Theme Editor
HighCVE-2025-5555: Stack-based Buffer Overflow in Nixdorf Wincor PORT IO Driver
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.