Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1927: CWE-352 Cross-Site Request Forgery (CSRF) in Restajet Information Technologies Inc. Online Food Delivery System

0
High
VulnerabilityCVE-2025-1927cvecve-2025-1927cwe-352
Published: Fri Dec 19 2025 (12/19/2025, 12:01:03 UTC)
Source: CVE Database V5
Vendor/Project: Restajet Information Technologies Inc.
Product: Online Food Delivery System

Description

Cross-Site Request Forgery (CSRF) vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Cross Site Request Forgery.This issue affects Online Food Delivery System: through 19122025.

AI-Powered Analysis

AILast updated: 12/26/2025, 12:57:39 UTC

Technical Analysis

CVE-2025-1927 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Online Food Delivery System developed by Restajet Information Technologies Inc. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a malicious request to a web application without their knowledge, exploiting the user's active session. This specific vulnerability allows attackers to perform unauthorized state-changing operations on the affected system, potentially altering orders, user settings, or other critical data. The CVSS v3.1 score of 7.1 reflects a high severity, with an attack vector classified as network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The impact primarily affects integrity (I:H) with limited confidentiality impact (C:L) and no availability impact (A:N). The vulnerability affects all versions up to 19122025, with no patches currently available. Although no exploits have been observed in the wild, the vulnerability's characteristics make it a viable target for attackers aiming to manipulate online food delivery operations. The lack of user interaction and low privilege requirements increase the risk of exploitation, especially in environments where users maintain persistent authenticated sessions. The vulnerability is categorized under CWE-352, which is a common web application security weakness related to insufficient request validation mechanisms against CSRF attacks.

Potential Impact

For European organizations utilizing the Restajet Online Food Delivery System, this vulnerability could lead to unauthorized manipulation of orders, customer data, or system configurations, undermining data integrity and customer trust. Attackers could exploit the vulnerability to place fraudulent orders, modify delivery details, or alter payment information, potentially causing financial losses and reputational damage. Given the critical role of online food delivery services in urban and commercial settings, disruptions or unauthorized actions could affect business continuity and customer satisfaction. Additionally, regulatory compliance risks may arise if customer data is improperly accessed or modified, especially under GDPR mandates. The absence of availability impact reduces the risk of service outages, but the integrity compromise remains significant. Organizations may also face increased exposure to fraud and legal liabilities if attackers leverage this vulnerability to conduct unauthorized transactions or data tampering.

Mitigation Recommendations

To mitigate CVE-2025-1927, organizations should implement robust anti-CSRF protections such as synchronizer tokens (CSRF tokens) embedded in forms and verified on the server side for all state-changing requests. Additionally, validating the HTTP Referer or Origin headers can help confirm request legitimacy. Enforcing SameSite cookie attributes (preferably 'Strict' or 'Lax') reduces the risk of cross-origin requests carrying authentication cookies. Session management should be tightened to limit session duration and scope, and multi-factor authentication can add an additional security layer. Developers should review and update the Online Food Delivery System codebase to include these protections and conduct thorough security testing, including automated CSRF vulnerability scanners. Network-level protections such as Web Application Firewalls (WAFs) can be configured to detect and block suspicious CSRF attempts. Finally, organizations should monitor logs for unusual activity patterns indicative of CSRF exploitation attempts and educate users about the risks of unsolicited links or requests while authenticated.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-03-04T11:45:35.560Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69454096a90e3c9a152ce8bf

Added to database: 12/19/2025, 12:09:58 PM

Last enriched: 12/26/2025, 12:57:39 PM

Last updated: 2/7/2026, 6:38:29 AM

Views: 117

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats