Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4083: CWE-352 Cross-Site Request Forgery (CSRF) in way2neelam Easy Restaurant Table Booking

0
Medium
VulnerabilityCVE-2024-4083cvecve-2024-4083cwe-352
Published: Thu May 02 2024 (05/02/2024, 16:51:47 UTC)
Source: CVE Database V5
Vendor/Project: way2neelam
Product: Easy Restaurant Table Booking

Description

CVE-2024-4083 is a Cross-Site Request Forgery (CSRF) vulnerability affecting all versions up to 1. 0. 0 of the Easy Restaurant Table Booking WordPress plugin by way2neelam. The vulnerability arises from missing or incorrect nonce validation when saving plugin settings, allowing unauthenticated attackers to trick site administrators into executing unwanted actions via forged requests. Exploitation requires user interaction, specifically an administrator clicking a malicious link. The vulnerability impacts the integrity of plugin settings but does not affect confidentiality or availability. The CVSS score is 4. 3 (medium severity). No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized configuration changes.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:28:01 UTC

Technical Analysis

CVE-2024-4083 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Easy Restaurant Table Booking plugin for WordPress, versions up to and including 1.0.0. The root cause is the absence or improper implementation of nonce validation during the saving of plugin settings. Nonces are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Without proper nonce checks, an attacker can craft a malicious request that, when executed by an authenticated administrator (e.g., by clicking a link), causes unauthorized changes to the plugin’s configuration. This vulnerability does not require the attacker to be authenticated but does require the victim to have administrative privileges and to perform an action that triggers the forged request. The impact is limited to integrity, as attackers can alter settings but cannot directly access sensitive data or disrupt service availability. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) reflects network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality or availability impact, and limited integrity impact. No patches or exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly.

Potential Impact

The primary impact of this vulnerability is the unauthorized modification of plugin settings, which can lead to misconfiguration of the restaurant booking system. This may result in operational disruptions, incorrect booking data, or potential exposure to further attacks if settings control security-related features. Since the attacker must trick an administrator into clicking a malicious link, the risk depends on the administrator’s susceptibility to social engineering. While confidentiality and availability are not directly affected, integrity compromise can undermine trust in the booking system and cause business process issues. Organizations relying on this plugin for customer reservations may face reputational damage and operational inefficiencies if exploited. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly known.

Mitigation Recommendations

Organizations should immediately verify if they use the Easy Restaurant Table Booking plugin and identify the installed version. Since no official patch links are provided, administrators should monitor the vendor’s site for updates or security patches addressing nonce validation. As an interim mitigation, restrict administrative access to trusted personnel and implement strict user training to avoid clicking suspicious links. Employ web application firewalls (WAFs) with custom rules to detect and block CSRF attempts targeting the plugin’s settings endpoints. Additionally, enforce multi-factor authentication (MFA) for administrator accounts to reduce the risk of compromised credentials being exploited in conjunction with CSRF. Regularly audit plugin configurations and logs for unauthorized changes. Consider disabling or replacing the plugin if a timely patch is unavailable.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-23T15:44:33.179Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b80b7ef31ef0b556061

Added to database: 2/25/2026, 9:37:04 PM

Last enriched: 2/26/2026, 12:28:01 AM

Last updated: 2/26/2026, 8:05:50 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats