Cyber Posture

CVE-2025-9209

Critical

Published: 03 October 2025

Published
03 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1876 95.3th percentile
Risk Priority 31 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may forge credential materials that can be used to gain access to web applications or Internet services.

Security Summary

CVE-2025-9209 is an authentication bypass vulnerability affecting the RestroPress – Online Food Ordering System plugin for WordPress in versions 3.0.0 through 3.1.9.2. The flaw arises because the plugin exposes user private tokens and API data via the /wp-json/wp/v2/users REST API endpoint, allowing attackers to forge JSON Web Tokens (JWT) for other users, including administrators, and authenticate as them. It is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no privileges or user interaction required. By accessing the exposed endpoint, they can retrieve necessary data to craft valid JWT tokens impersonating any site user, including those with administrator privileges, thereby achieving high-impact unauthorized access to confidential data, modification of site content, and potential disruption of services.

Advisories and mitigation guidance are available from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/359833dd-de3c-48ea-8eef-06588a590da2?source=cve and the plugin's page on WordPress.org at https://wordpress.org/plugins/restropress/. The vulnerability was published on 2025-10-03T12:15:47.240.

Details

CWE(s)
CWE-200

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1606 Forge Web Credentials Credential Access
Adversaries may forge credential materials that can be used to gain access to web applications or Internet services.
Why these techniques?

The vulnerability enables exploitation of a public-facing WordPress REST API endpoint (T1190) to expose data allowing attackers to forge JWTs for user impersonation (T1606).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References