Skip to main content

CVE-2023-51673: CWE-352 Cross-Site Request Forgery (CSRF) in Designful Stylish Price List – Price Table Builder & QR Code Restaurant Menu

Medium
VulnerabilityCVE-2023-51673cvecve-2023-51673cwe-352
Published: Fri Jan 05 2024 (01/05/2024, 09:54:20 UTC)
Source: CVE
Vendor/Project: Designful
Product: Stylish Price List – Price Table Builder & QR Code Restaurant Menu

Description

Cross-Site Request Forgery (CSRF) vulnerability in Designful Stylish Price List – Price Table Builder & QR Code Restaurant Menu.This issue affects Stylish Price List – Price Table Builder & QR Code Restaurant Menu: from n/a through 7.0.17.

AI-Powered Analysis

AILast updated: 07/08/2025, 21:43:46 UTC

Technical Analysis

CVE-2023-51673 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress plugin 'Designful Stylish Price List – Price Table Builder & QR Code Restaurant Menu,' affecting versions up to 7.0.17. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged request to a web application in which they are currently authenticated, without their consent or knowledge. In this case, the vulnerability could enable an attacker to perform unauthorized actions on behalf of the user, such as modifying price lists or menu configurations, potentially disrupting the integrity and availability of the affected website's content. The CVSS 3.1 base score of 5.4 (medium severity) reflects that the vulnerability can be exploited remotely over the network without authentication (AV:N, PR:N), requires low attack complexity (AC:L), but does require user interaction (UI:R). The impact is limited to integrity and availability (I:L, A:L) with no confidentiality impact (C:N). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which is a well-known web security weakness related to insufficient request validation to prevent CSRF attacks. Given the plugin’s role in managing price tables and QR code menus, exploitation could lead to unauthorized changes in pricing or menu data, potentially causing business disruption or reputational damage for affected websites.

Potential Impact

For European organizations, especially those in the hospitality, restaurant, and retail sectors that utilize WordPress websites with this plugin, the impact could be significant. Unauthorized modification of price lists or menu items could lead to financial discrepancies, customer confusion, or loss of trust. Additionally, if attackers manipulate QR code menus, it could misdirect customers or cause operational disruptions. Although the vulnerability does not directly compromise sensitive data confidentiality, the integrity and availability impacts could affect business operations and customer experience. Organizations relying on this plugin for their online menu or pricing presentation should be aware that attackers could exploit this vulnerability to perform unauthorized changes remotely, potentially leading to financial loss or reputational harm. The requirement for user interaction means phishing or social engineering could be used to trigger the exploit, increasing the risk if employees or administrators are targeted.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are using the affected plugin version (up to 7.0.17). Since no patch links are currently available, immediate mitigation steps include: 1) Implementing Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the plugin’s endpoints. 2) Enforcing strict Content Security Policy (CSP) headers to reduce the risk of malicious cross-site requests. 3) Educating administrators and users about phishing and social engineering risks to minimize user interaction exploitation. 4) Temporarily disabling or replacing the plugin with alternative solutions that have proper CSRF protections until an official patch is released. 5) Monitoring web server and application logs for unusual POST requests or changes to price/menu data that could indicate exploitation attempts. 6) Applying principle of least privilege for WordPress user roles to limit the impact of compromised accounts. Organizations should also subscribe to vendor and security advisories to promptly apply patches once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2023-12-21T14:51:15.760Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6830a0ae0acd01a24927412c

Added to database: 5/23/2025, 4:22:06 PM

Last enriched: 7/8/2025, 9:43:46 PM

Last updated: 8/18/2025, 11:28:18 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats