CVE-2025-9209
BaseFortify
Publication date: 2025-10-03
Last updated on: 2025-10-06
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| magnigenie | restropress | 3.0.0 |
| magnigenie | restropress | 3.1.9.2 |
| wordpress | wordpress | * |
| magnigenie | restropress | 3.2.1.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the RestroPress β Online Food Ordering System plugin for WordPress allows unauthenticated attackers to bypass authentication by exploiting exposed user private tokens and API data via the /wp-json/wp/v2/users REST API endpoint. This enables attackers to forge JWT tokens for other users, including administrators, and authenticate as them.
How can this vulnerability impact me? :
This vulnerability can have a severe impact as attackers can gain unauthorized access to user accounts, including administrator accounts. This can lead to full system compromise, data theft, unauthorized actions, and disruption of services.