Vulnerability Description
The RestroPress – Online Food Ordering System plugin for WordPress is vulnerable to Authentication Bypass in versions 3.0.0 to 3.1.9.2. This is due to the plugin exposing user private tokens and API data via the /wp-json/wp/v2/users REST API endpoint. This makes it possible for unauthenticated attackers to forge JWT tokens for other users, including administrators, and authenticate as them.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://wordpress.org/plugins/restropress/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/359833dd-de3c-48ea-8ee
FAQ
What is CVE-2025-9209?
CVE-2025-9209 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The RestroPress – Online Food Ordering System plugin for WordPress is vulnerable to Authentication Bypass in versions 3.0.0 to 3.1.9.2. This is due to the plugin exposing user private tokens and API d...
How severe is CVE-2025-9209?
CVE-2025-9209 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-9209?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.