Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62647: CWE-863 Incorrect Authorization in Restaurant Brands International assistant platform

0
Medium
VulnerabilityCVE-2025-62647cvecve-2025-62647cwe-863
Published: Fri Oct 17 2025 (10/17/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Restaurant Brands International
Product: assistant platform

Description

The Restaurant Brands International (RBI) assistant platform through 2025-09-06 provides the functionality of returning a JWT that can be used to call an API to return a signed AWS upload URL, for any store's path.

AI-Powered Analysis

AILast updated: 10/29/2025, 15:37:50 UTC

Technical Analysis

CVE-2025-62647 is an authorization vulnerability classified under CWE-863 found in the Restaurant Brands International assistant platform. The flaw lies in the platform's mechanism for issuing JSON Web Tokens (JWTs) that are used to call an API endpoint returning signed AWS upload URLs. These URLs grant the ability to upload or modify content within store-specific paths in AWS storage. Due to incorrect authorization checks, an authenticated user with some privileges can request JWTs that allow access to any store's upload path, not just those they are authorized for. This breaks the principle of least privilege and can lead to unauthorized integrity modifications of store data or assets. The vulnerability has a CVSS 3.1 base score of 5.0, indicating medium severity, with attack vector being network-based, low attack complexity, requiring privileges but no user interaction, and impacting integrity without affecting confidentiality or availability. No public exploits are known at this time, but the vulnerability presents a risk of unauthorized content manipulation within the RBI ecosystem. The affected product version is listed as '0', suggesting either an early or internal version, and no patches are currently linked. The issue was published on October 17, 2025.

Potential Impact

For European organizations, particularly those operating RBI franchises or integrating with the RBI assistant platform, this vulnerability could enable unauthorized modification of store-specific data or content hosted on AWS. This may lead to data integrity issues, such as tampering with promotional materials, menu information, or operational data, potentially causing reputational damage or operational disruptions. While confidentiality and availability are not directly impacted, integrity violations can undermine trust in digital assets and may facilitate further attacks if malicious content is uploaded. Given the network-based attack vector and low complexity, attackers with some level of access could exploit this vulnerability remotely. The impact is heightened in Europe due to the presence of RBI brands and the regulatory environment emphasizing data integrity and security. Failure to address this vulnerability could also lead to compliance risks under regulations like GDPR if manipulated data affects customer information or service delivery.

Mitigation Recommendations

To mitigate CVE-2025-62647, RBI should implement strict authorization checks ensuring JWTs are only issued for store paths the requesting user is explicitly authorized to access. This includes validating user privileges against the requested store identifier before token issuance. The API generating signed AWS upload URLs must enforce access control policies that verify the JWT's scope and permissions correspond to the target resource path. Employing fine-grained role-based access control (RBAC) and continuous monitoring of API usage patterns can help detect and prevent abuse. Additionally, implementing logging and alerting on anomalous upload URL requests or uploads can provide early warning of exploitation attempts. Organizations using the assistant platform should apply any forthcoming patches promptly and conduct security reviews of their integration points. Network segmentation and limiting access to the assistant platform APIs to trusted internal systems can reduce exposure. Finally, regular security training for developers and administrators on secure token handling and authorization best practices is recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-10-17T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f2ab359c34d0947f42a467

Added to database: 10/17/2025, 8:46:45 PM

Last enriched: 10/29/2025, 3:37:50 PM

Last updated: 11/29/2025, 3:06:26 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats