Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| magnigenie | RestroPress – Online Food Ordering System | 3.0.0 ~ 3.1.9.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | RestroPress – Online Food Ordering System 3.0.0 - 3.1.9.2 - Unauthenticated Information Exposure to Authentication Bypass via Forged JWT | https://github.com/Nxploited/CVE-2025-9209 | POC Details |
| 2 | RestroPress Online Food Ordering System WordPress plugin 3.0.0 to 3.1.9.2 contains an authentication bypass caused by exposure of user private tokens and API data via /wp-json/wp/v2/users endpoint, letting unauthenticated attackers forge JWT tokens and authenticate as other users including administrators, exploit requires no authentication. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-9209.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet