CVE-2025-62647: CWE-863 Incorrect Authorization in Restaurant Brands International assistant platform
The Restaurant Brands International (RBI) assistant platform through 2025-09-06 provides the functionality of returning a JWT that can be used to call an API to return a signed AWS upload URL, for any store's path.
AI Analysis
Technical Summary
CVE-2025-62647 is an authorization vulnerability classified under CWE-863 found in the Restaurant Brands International assistant platform. The flaw lies in the platform's mechanism for issuing JSON Web Tokens (JWTs) that are used to call an API endpoint returning signed AWS upload URLs. These URLs grant the ability to upload or modify content within store-specific paths in AWS storage. Due to incorrect authorization checks, an authenticated user with some privileges can request JWTs that allow access to any store's upload path, not just those they are authorized for. This breaks the principle of least privilege and can lead to unauthorized integrity modifications of store data or assets. The vulnerability has a CVSS 3.1 base score of 5.0, indicating medium severity, with attack vector being network-based, low attack complexity, requiring privileges but no user interaction, and impacting integrity without affecting confidentiality or availability. No public exploits are known at this time, but the vulnerability presents a risk of unauthorized content manipulation within the RBI ecosystem. The affected product version is listed as '0', suggesting either an early or internal version, and no patches are currently linked. The issue was published on October 17, 2025.
Potential Impact
For European organizations, particularly those operating RBI franchises or integrating with the RBI assistant platform, this vulnerability could enable unauthorized modification of store-specific data or content hosted on AWS. This may lead to data integrity issues, such as tampering with promotional materials, menu information, or operational data, potentially causing reputational damage or operational disruptions. While confidentiality and availability are not directly impacted, integrity violations can undermine trust in digital assets and may facilitate further attacks if malicious content is uploaded. Given the network-based attack vector and low complexity, attackers with some level of access could exploit this vulnerability remotely. The impact is heightened in Europe due to the presence of RBI brands and the regulatory environment emphasizing data integrity and security. Failure to address this vulnerability could also lead to compliance risks under regulations like GDPR if manipulated data affects customer information or service delivery.
Mitigation Recommendations
To mitigate CVE-2025-62647, RBI should implement strict authorization checks ensuring JWTs are only issued for store paths the requesting user is explicitly authorized to access. This includes validating user privileges against the requested store identifier before token issuance. The API generating signed AWS upload URLs must enforce access control policies that verify the JWT's scope and permissions correspond to the target resource path. Employing fine-grained role-based access control (RBAC) and continuous monitoring of API usage patterns can help detect and prevent abuse. Additionally, implementing logging and alerting on anomalous upload URL requests or uploads can provide early warning of exploitation attempts. Organizations using the assistant platform should apply any forthcoming patches promptly and conduct security reviews of their integration points. Network segmentation and limiting access to the assistant platform APIs to trusted internal systems can reduce exposure. Finally, regular security training for developers and administrators on secure token handling and authorization best practices is recommended.
Affected Countries
United Kingdom, Germany, France, Spain, Italy, Netherlands
CVE-2025-62647: CWE-863 Incorrect Authorization in Restaurant Brands International assistant platform
Description
The Restaurant Brands International (RBI) assistant platform through 2025-09-06 provides the functionality of returning a JWT that can be used to call an API to return a signed AWS upload URL, for any store's path.
AI-Powered Analysis
Technical Analysis
CVE-2025-62647 is an authorization vulnerability classified under CWE-863 found in the Restaurant Brands International assistant platform. The flaw lies in the platform's mechanism for issuing JSON Web Tokens (JWTs) that are used to call an API endpoint returning signed AWS upload URLs. These URLs grant the ability to upload or modify content within store-specific paths in AWS storage. Due to incorrect authorization checks, an authenticated user with some privileges can request JWTs that allow access to any store's upload path, not just those they are authorized for. This breaks the principle of least privilege and can lead to unauthorized integrity modifications of store data or assets. The vulnerability has a CVSS 3.1 base score of 5.0, indicating medium severity, with attack vector being network-based, low attack complexity, requiring privileges but no user interaction, and impacting integrity without affecting confidentiality or availability. No public exploits are known at this time, but the vulnerability presents a risk of unauthorized content manipulation within the RBI ecosystem. The affected product version is listed as '0', suggesting either an early or internal version, and no patches are currently linked. The issue was published on October 17, 2025.
Potential Impact
For European organizations, particularly those operating RBI franchises or integrating with the RBI assistant platform, this vulnerability could enable unauthorized modification of store-specific data or content hosted on AWS. This may lead to data integrity issues, such as tampering with promotional materials, menu information, or operational data, potentially causing reputational damage or operational disruptions. While confidentiality and availability are not directly impacted, integrity violations can undermine trust in digital assets and may facilitate further attacks if malicious content is uploaded. Given the network-based attack vector and low complexity, attackers with some level of access could exploit this vulnerability remotely. The impact is heightened in Europe due to the presence of RBI brands and the regulatory environment emphasizing data integrity and security. Failure to address this vulnerability could also lead to compliance risks under regulations like GDPR if manipulated data affects customer information or service delivery.
Mitigation Recommendations
To mitigate CVE-2025-62647, RBI should implement strict authorization checks ensuring JWTs are only issued for store paths the requesting user is explicitly authorized to access. This includes validating user privileges against the requested store identifier before token issuance. The API generating signed AWS upload URLs must enforce access control policies that verify the JWT's scope and permissions correspond to the target resource path. Employing fine-grained role-based access control (RBAC) and continuous monitoring of API usage patterns can help detect and prevent abuse. Additionally, implementing logging and alerting on anomalous upload URL requests or uploads can provide early warning of exploitation attempts. Organizations using the assistant platform should apply any forthcoming patches promptly and conduct security reviews of their integration points. Network segmentation and limiting access to the assistant platform APIs to trusted internal systems can reduce exposure. Finally, regular security training for developers and administrators on secure token handling and authorization best practices is recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-17T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f2ab359c34d0947f42a467
Added to database: 10/17/2025, 8:46:45 PM
Last enriched: 10/29/2025, 3:37:50 PM
Last updated: 11/29/2025, 3:06:26 PM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Analysis of 8 Foundational Cache Poisoning Attacks (HackerOne, GitHub, Shopify) - Part 1
MediumCVE-2024-39936: n/a
HighCVE-2025-6666: Use of Hard-coded Cryptographic Key in motogadget mo.lock Ignition Lock
LowCVE-2025-65892: n/a
UnknownCVE-2025-65540: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.