Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62645: CWE-266 Incorrect Privilege Assignment in Restaurant Brands International assistant platform

0
Critical
VulnerabilityCVE-2025-62645cvecve-2025-62645cwe-266
Published: Fri Oct 17 2025 (10/17/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Restaurant Brands International
Product: assistant platform

Description

The Restaurant Brands International (RBI) assistant platform through 2025-09-06 allows a remote authenticated attacker to obtain a token with administrative privileges for the entire platform via the createToken GraphQL mutation.

AI-Powered Analysis

AILast updated: 10/17/2025, 21:16:44 UTC

Technical Analysis

CVE-2025-62645 is a critical security vulnerability identified in the Restaurant Brands International (RBI) assistant platform, specifically affecting the createToken GraphQL mutation. The root cause is an incorrect privilege assignment (CWE-266), where the platform improperly grants administrative privileges to tokens created by remote authenticated users. This means that any attacker who can authenticate to the platform, even with limited privileges, can exploit this flaw to escalate their privileges to full administrative rights. The vulnerability does not require user interaction and can be exploited remotely over the network, making it highly accessible to attackers with valid credentials. The CVSS v3.1 score of 9.9 underscores the critical nature of this flaw, indicating high impact on confidentiality, integrity, and availability, as well as ease of exploitation with low attack complexity. The vulnerability affects all versions up to 2025-09-06, with no patches currently available at the time of reporting. The lack of known exploits in the wild suggests it may be newly disclosed, but the potential for abuse is significant given the administrative control gained. The assistant platform is likely used for operational management and automation within RBI’s ecosystem, so compromise could lead to unauthorized data access, manipulation of operational workflows, and potential disruption of services. The GraphQL API’s createToken mutation is the attack vector, which should be carefully monitored and restricted. This vulnerability highlights the importance of proper privilege assignment and access control in API design, especially in platforms managing critical business operations.

Potential Impact

For European organizations using the RBI assistant platform, this vulnerability poses a severe risk. Attackers gaining administrative tokens can fully control the platform, leading to unauthorized access to sensitive operational data, manipulation of business processes, and potential disruption of services. This could result in data breaches involving customer information, financial data, or internal communications. The integrity of the platform could be compromised, allowing attackers to alter configurations or deploy malicious changes. Availability could also be impacted if attackers disrupt platform functionality or lock out legitimate users. Given RBI’s presence in the European food service market, affected organizations may face regulatory scrutiny under GDPR for data breaches and operational failures. The reputational damage and financial losses from service disruption or data compromise could be substantial. Additionally, attackers could leverage administrative access to pivot into broader corporate networks, increasing the scope of impact. The critical severity and ease of exploitation make this a top priority threat for affected entities in Europe.

Mitigation Recommendations

1. Immediate monitoring and restriction of access to the createToken GraphQL mutation, limiting it to only trusted and necessary users. 2. Conduct a thorough review and audit of user privileges within the RBI assistant platform to ensure least privilege principles are enforced. 3. Implement multi-factor authentication (MFA) for all authenticated users to reduce the risk of credential compromise. 4. Deploy anomaly detection and logging on token creation activities to identify suspicious privilege escalation attempts. 5. Isolate the assistant platform network segment and restrict administrative access via network segmentation and firewall rules. 6. Engage with RBI for timely patching once a fix is released and apply updates immediately. 7. Conduct penetration testing and security assessments focused on GraphQL API endpoints to identify and remediate similar privilege assignment issues. 8. Educate platform administrators and users about the risks of privilege escalation and encourage reporting of unusual platform behavior. 9. Prepare incident response plans specifically addressing potential exploitation scenarios of this vulnerability. 10. Consider temporary disabling or limiting the use of the createToken mutation if operationally feasible until patched.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-10-17T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f2aebd9c34d0947f437b5f

Added to database: 10/17/2025, 9:01:49 PM

Last enriched: 10/17/2025, 9:16:44 PM

Last updated: 10/19/2025, 8:01:41 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats