RestroPress – Online Food Ordering System Vulnerability (Medium) – …

RestroPress – Online Food Ordering System Vulnerability (Medium) – …

by | Apr 15, 2026 | Plugins

Attack Vectors

CVE-2025-31877 is a Medium-severity authorization issue (CVSS 4.3) affecting the RestroPress – Online Food Ordering System WordPress plugin (slug: restropress) in versions up to and including 3.2.8.

The vulnerability can be exploited remotely over the network by an authenticated user with Subscriber-level access (or higher) and does not require user interaction to trigger (per the CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).

Reference: CVE-2025-31877 record.

Security Weakness

The issue is caused by a missing capability (authorization) check on a plugin function. In practical terms, this means the plugin does not reliably verify that the logged-in user has the right WordPress permission level before allowing a sensitive action to proceed.

Because it is an authorization gap (not a login bypass), the attacker still needs a valid account—however, many sites allow self-registration or maintain large numbers of low-privilege accounts, which can increase exposure.

Source: Wordfence vulnerability advisory.

Technical or Business Impacts

According to the published scoring, this vulnerability is primarily an integrity concern (low impact) rather than data theft or downtime (no confidentiality or availability impact is indicated). That said, any unauthorized action inside an online ordering workflow can create real operational and reputational risk.

For business leaders, likely impacts include process disruption (unexpected changes that require staff time to investigate), order or configuration integrity concerns (stakeholders questioning whether order-related settings and actions are trustworthy), and compliance/audit friction if controls around role-based access are expected (especially where least-privilege access is part of policy).

Remediation: Update RestroPress to version 3.2.8.1 or any newer patched release that includes the fix.

Similar Attacks

Authorization gaps and “broken access control” issues are common across platforms and can have outsized business impact when they allow low-privilege users to perform actions they shouldn’t. A few well-known examples include:

CVE-2023-22515 (Atlassian Confluence) — an improper authorization issue that was widely discussed due to the risk of unauthorized administrative actions.
Facebook “View As” security update (2018) — a high-profile incident involving access control flaws that led to unauthorized account access risks.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers