Skip to content

NuytsTech Security

  • Home
  • Terms of Use
    • Privacy Policy
  • Blog
  • Cloud Hosting
  • Contact

NuytsTech Security

  • Home
  • Terms of Use
    • Privacy Policy
  • Blog
  • Cloud Hosting
  • Contact
  • Vulnerabilities

CVE-2025-9209

by Fred · 03/10/2025

The RestroPress – Online Food Ordering System plugin for WordPress is vulnerable to Authentication Bypass in versions 3.0.0 to 3.1.9.2. This is due to the plugin exposing user private tokens and API data via the /wp-json/wp/v2/users REST API endpoint. This makes it possible for unauthenticated attackers to forge JWT tokens for other users, including administrators, and authenticate as them.

More information : https://wordpress.org/plugins/restropress/

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Mastodon (Opens in new window) Mastodon

Similar

Tags: Cybersecurity Alert

  • Next story CVE-2025-9333
  • Previous story CVE-2025-9204

Recent Posts

  • CVE-2025-9952
  • CVE-2025-9886
  • CVE-2025-10383
  • CVE-2025-9485
  • CVE-2025-9243
  • CVE-2025-9030
  • CVE-2025-9029
  • CVE-2025-8726
  • CVE-2025-61962
  • CVE-2025-11228
  • CVE-2025-11227
  • CVE-2025-10746
  • CVE-2025-10751
  • CVE-2025-61685
  • CVE-2025-61681
  • CVE-2025-61680
  • CVE-2025-61679
  • CVE-2025-61677
  • CVE-2025-61673
  • CVE-2025-43825
  • CVE-2025-59944
  • CVE-2025-59943
  • CVE-2025-10696
  • CVE-2025-10695
  • CVE-2025-10692
  • CVE-2025-59829
  • CVE-2025-54374
  • CVE-2025-53354
  • CVE-2025-49844
  • CVE-2025-57714

Categories

  • Critical cyberalert
  • Vulnerabilities

Tags

CISA Cybersecurity Alert Shields Up

© 1999-2025 NUYTSTECH. All Rights Reserved. Use of the CVE (Common Vulnerabilities and Exposures) from this non-profit website are subject to the terms of use.

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.