CVE-2025-9209

The · The RestroPress – Online Food Ordering System plugin for WordPress

A critical authentication bypass vulnerability has been identified in the RestroPress plugin for WordPress, affecting multiple products.

Executive summary

A critical authentication bypass vulnerability has been identified in the RestroPress plugin for WordPress, affecting multiple products. This flaw allows an unauthenticated attacker to gain unauthorized access to the system by exploiting exposed user tokens and API details, potentially leading to a complete compromise of the affected website, data theft, and operational disruption.

Vulnerability

The vulnerability exists because the plugin improperly exposes sensitive information, specifically user private tokens and API details. An unauthenticated remote attacker can access this exposed information and use it to craft malicious requests that bypass standard authentication mechanisms. By leveraging these leaked tokens, the attacker can impersonate a legitimate user, potentially including an administrator, to gain privileged access to the WordPress dashboard and underlying system.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8, posing a significant threat to the business. Successful exploitation could grant an attacker complete administrative control over the website. This could lead to severe consequences, including theft of sensitive customer data (personally identifiable information, order history), financial fraud, website defacement, malware injection, and disruption of online ordering services, resulting in significant financial loss, reputational damage, and loss of customer trust.

Remediation

Immediate Action: Immediately update The RestroPress plugin to the latest patched version across all WordPress instances. After patching, it is crucial to review server access logs and audit user accounts for any signs of unauthorized access or suspicious activity that may have occurred prior to the update.

Proactive Monitoring: Implement continuous monitoring of web server and application logs for unusual API requests or direct access attempts targeting sensitive plugin endpoints. Monitor for the creation of new, unauthorized administrative user accounts or unexpected modifications to plugin files and website content.

Compensating Controls: If patching cannot be performed immediately, consider implementing a Web Application Firewall (WAF) with custom rules to block requests that attempt to access the exposed token information. Additionally, restrict access to the WordPress administrative interface (/wp-admin) to trusted IP addresses only. If the plugin's functionality is not critical, consider temporarily disabling it until it can be safely updated.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 9.8, immediate action is required. Organizations using the affected versions of the RestroPress plugin must prioritize applying the security update without delay. Although this vulnerability is not currently listed on the CISA KEV list, its severity makes it a prime target for opportunistic and targeted attacks. A post-patch review for indicators of compromise is strongly advised to ensure systems were not breached before the remediation was applied.