CVE-2025-62645

The · The Restaurant Brands International Multiple Products

A critical privilege escalation vulnerability has been identified in The Restaurant Brands International (RBI) assistant platform.

Executive summary

A critical privilege escalation vulnerability has been identified in The Restaurant Brands International (RBI) assistant platform. This flaw allows an authenticated attacker to remotely gain full administrative control over the entire platform, posing a severe risk of complete system compromise, data theft, and operational disruption. Immediate patching is required to mitigate this threat.

Vulnerability

This is a critical privilege escalation vulnerability. A remote attacker who has already authenticated to the RBI assistant platform with low-level privileges can exploit a flaw in the token generation or validation mechanism. By sending a specially crafted request, the attacker can obtain a new session token that has been improperly assigned the highest administrative privileges, effectively bypassing all authorization controls and granting them complete control over the platform and its data.

Business impact

This vulnerability is of critical severity with a CVSS score of 9.9. Successful exploitation would grant an attacker complete administrative control, leading to catastrophic business consequences. Potential impacts include unauthorized access to and exfiltration of sensitive corporate data, customer personally identifiable information (PII), and financial records. An attacker could also manipulate or delete data, disrupt critical business operations reliant on the platform, commit fraud, and cause significant, long-lasting reputational damage to The Restaurant Brands International and its associated brands.

Remediation

Immediate Action: Apply the vendor-supplied patches to all affected products immediately. The primary remediation is to update The Restaurant Brands International Multiple Products to the latest version that addresses this vulnerability. After patching, review access logs for any evidence of successful or attempted exploitation, such as unusual token generation events or unexpected administrative actions.

Proactive Monitoring: Implement enhanced monitoring on the affected platform. Security teams should specifically look for unusual API calls related to authentication and token management, logs showing users' privileges being elevated outside of normal administrative processes, and the creation of new administrative accounts. Monitor for logins from unusual IP addresses or at atypical hours, especially for privileged accounts.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk. Restrict network access to the affected platform's management interface to a limited set of trusted IP addresses. Implement a Web Application Firewall (WAF) with rules designed to detect and block suspicious requests targeting authentication endpoints. Increase the scrutiny and alerting on all administrative activities until patches can be applied.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical severity (CVSS 9.9) of this vulnerability, we recommend that organizations treat this as an emergency and prioritize the immediate deployment of vendor-supplied patches across all affected systems. Although this CVE is not currently listed on the CISA KEV catalog, its high impact and potential for widespread compromise make it a prime candidate for future inclusion. Organizations should assume active targeting will begin shortly and act decisively to remediate the vulnerability and hunt for any signs of prior compromise.