Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3f29-4g5p-wvc9

Опубликовано: 03 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

The RestroPress – Online Food Ordering System plugin for WordPress is vulnerable to Authentication Bypass in versions 3.0.0 to 3.1.9.2. This is due to the plugin exposing user private tokens and API data via the /wp-json/wp/v2/users REST API endpoint. This makes it possible for unauthenticated attackers to forge JWT tokens for other users, including administrators, and authenticate as them.

The RestroPress – Online Food Ordering System plugin for WordPress is vulnerable to Authentication Bypass in versions 3.0.0 to 3.1.9.2. This is due to the plugin exposing user private tokens and API data via the /wp-json/wp/v2/users REST API endpoint. This makes it possible for unauthenticated attackers to forge JWT tokens for other users, including administrators, and authenticate as them.

EPSS

Процентиль: 66%
0.0052
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 9.8
nvd
4 месяца назад

The RestroPress – Online Food Ordering System plugin for WordPress is vulnerable to Authentication Bypass in versions 3.0.0 to 3.1.9.2. This is due to the plugin exposing user private tokens and API data via the /wp-json/wp/v2/users REST API endpoint. This makes it possible for unauthenticated attackers to forge JWT tokens for other users, including administrators, and authenticate as them.

EPSS

Процентиль: 66%
0.0052
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-200