Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9209: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in magnigenie RestroPress – Online Food Ordering System

0
Critical
VulnerabilityCVE-2025-9209cvecve-2025-9209cwe-200
Published: Fri Oct 03 2025 (10/03/2025, 11:17:09 UTC)
Source: CVE Database V5
Vendor/Project: magnigenie
Product: RestroPress – Online Food Ordering System

Description

The RestroPress – Online Food Ordering System plugin for WordPress is vulnerable to Authentication Bypass in versions 3.0.0 to 3.1.9.2. This is due to the plugin exposing user private tokens and API data via the /wp-json/wp/v2/users REST API endpoint. This makes it possible for unauthenticated attackers to forge JWT tokens for other users, including administrators, and authenticate as them.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:46:11 UTC

Technical Analysis

The vulnerability identified as CVE-2025-9209 affects the RestroPress – Online Food Ordering System plugin for WordPress, specifically versions 3.0.0 through 3.1.9.2. This plugin exposes sensitive user private tokens and API data via the /wp-json/wp/v2/users REST API endpoint, which is publicly accessible without authentication. Due to this exposure, attackers can retrieve private tokens and subsequently forge JSON Web Tokens (JWTs) for arbitrary users, including those with administrative privileges. This authentication bypass allows attackers to impersonate any user, granting them unauthorized access to the system. The vulnerability stems from improper access control and information exposure (CWE-200). The CVSS 3.1 base score of 9.8 reflects the vulnerability’s critical nature, with network attack vector, no required privileges, no user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the ease of exploitation and the critical impact make this a severe threat. The lack of available patches increases the urgency for organizations to implement interim mitigations. The vulnerability compromises the core security model of the plugin, threatening user data confidentiality and system integrity, and potentially enabling full system takeover by attackers.

Potential Impact

The impact of CVE-2025-9209 is severe for organizations using the RestroPress plugin. Attackers can gain unauthorized administrative access, allowing them to manipulate orders, steal sensitive customer data, alter pricing or menu information, and disrupt service availability. This can lead to financial losses, reputational damage, and regulatory compliance violations, especially concerning customer data privacy. The exposure of private tokens also risks broader WordPress site compromise, potentially affecting other plugins and site components. For businesses relying on online food ordering, this could result in operational disruption and loss of customer trust. Given the critical nature of the vulnerability and the lack of patches, the threat extends to all organizations using affected versions, regardless of size or geography. The ability to forge JWT tokens without authentication significantly lowers the barrier for attackers, increasing the likelihood of exploitation once public details become widespread.

Mitigation Recommendations

Until an official patch is released, organizations should take immediate steps to mitigate the risk. First, disable or uninstall the vulnerable RestroPress plugin versions 3.0.0 to 3.1.9.2 if possible. If the plugin is essential, restrict access to the /wp-json/wp/v2/users REST API endpoint by implementing IP whitelisting or authentication requirements at the web server or application firewall level. Monitor logs for unusual JWT token creation or usage patterns, and implement anomaly detection on REST API requests. Enforce strong password policies and consider multi-factor authentication for WordPress administrator accounts to reduce the impact of compromised credentials. Regularly back up site data and configurations to enable rapid recovery. Stay alert for vendor updates or patches and apply them promptly once available. Additionally, conduct a thorough security audit of WordPress installations to identify any signs of compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-19T18:58:41.894Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dfb275c3835a5fbe033c48

Added to database: 10/3/2025, 11:24:37 AM

Last enriched: 2/26/2026, 5:46:11 PM

Last updated: 3/24/2026, 1:38:05 AM

Views: 168

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses