CVE Alert: CVE-2025-2412 – Akinsoft – QR Menu

CVE-2025-2412

HIGHNo exploitation known

Improper Restriction of Excessive Authentication Attempts vulnerability in Akinsoft QR Menu allows Authentication Bypass.This issue affects QR Menu: from s1.05.07 before v1.05.12.

CVSS v3.1 (8.6)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Akinsoft
Product
QR Menu
Versions
s1.05.07 lt v1.05.12
CWE
CWE-307, CWE-307 Improper Restriction of Excessive Authentication Attempts
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Published
2025-09-01T12:48:50.980Z
Updated
2025-09-01T12:48:50.980Z

AI Summary Analysis

Risk verdict

Critical unauthenticated authentication bypass exposed over the network; patch promptly when a fix is available.

Why this matters

An external actor can access admin-facing features and sensitive data with no user interaction, jeopardising confidentiality and trust. Remote exploitation could enable menu manipulation, data exposure, or transactional interference, with potential business disruption for hospitality/retail operations.

Most likely attack path

Attack vector is NETWORK with LOW complexity and no privileges required, and no user interaction needed. An attacker can reach the authentication endpoint directly, bypassing normal controls; successful exploitation could grant admin-like access within the affected scope, enabling rapid control of sensitive configurations or data.

Who is most exposed

Deployments in hospitality and retail sectors (QR menu kiosks, self-order units, and web-based admin consoles) are commonly on customer networks or cloud-hosted environments, increasing exposure to external traffic and lateral risk if not properly network-segmented.

Detection ideas

  • Unexpected successful logins or admin actions from unfamiliar IPs or locations.
  • Sudden changes to menu, pricing, or configuration without authorised users.
  • High rate of authentication attempts targeting the login endpoints.
  • Anomalous API activity on admin endpoints or elevated user privileges without corresponding authorised events.
  • Logs showing bypass indicators or failed-to-successful auth transition patterns.

Mitigation and prioritisation

  • Patch to v1.05.12 or newer immediately; verify SKU/installation scope before rollout.
  • If patching delays: enforce MFA for admin accounts, IP allowlisting, WAF rules around login endpoints, and rate limiting.
  • Enforce account lockout after repeated failures; review access controls and session management.
  • Network segmentation and least-privilege access for QR Menu services; monitor for anomalous admin activity.
  • Change-management: test in staging, phased deployment, and post-deploy monitoring with focused incident response.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.