CVE-2025-1927: CWE-352 Cross-Site Request Forgery (CSRF) in Restajet Information Technologies Inc. Online Food Delivery System
Cross-Site Request Forgery (CSRF) vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Cross Site Request Forgery.This issue affects Online Food Delivery System: through 19122025.
AI Analysis
Technical Summary
CVE-2025-1927 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Online Food Delivery System developed by Restajet Information Technologies Inc. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, causing the victim’s browser to perform unwanted actions on a web application where they are logged in. This particular vulnerability affects versions up to 19122025 of the product. The CVSS 3.1 base score is 7.1, indicating a high severity issue with the following vector: network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), high integrity impact (I:H), and no availability impact (A:N). This means an attacker with some level of privileges can exploit the vulnerability remotely without user interaction to alter data integrity, such as modifying orders or user information. Although no public exploits are currently known, the vulnerability’s nature and impact make it a significant risk, especially for organizations relying on this platform for critical business operations. The lack of available patches at the time of publication necessitates immediate attention to mitigation strategies. The vulnerability stems from insufficient anti-CSRF protections, such as missing or ineffective CSRF tokens or inadequate validation of request origins, allowing malicious sites to forge requests that the server accepts as legitimate. Given the product’s role in processing sensitive transactions and personal data, exploitation could lead to unauthorized order manipulations, fraudulent transactions, or disruption of service integrity.
Potential Impact
For European organizations using the Restajet Online Food Delivery System, this vulnerability poses a risk of unauthorized manipulation of orders, user account changes, or other critical operations performed via the platform. The integrity of transaction data could be compromised, leading to financial losses, reputational damage, and potential regulatory non-compliance under GDPR due to unauthorized data modifications. The confidentiality impact is limited but not negligible, as some user data could be indirectly exposed or altered. Availability is not impacted, so service disruption is unlikely. However, the ease of exploitation from a network perspective and the lack of required user interaction increase the threat level. Food delivery services are critical infrastructure in many urban areas, and disruption or compromise could affect business continuity and customer trust. Additionally, attackers could leverage this vulnerability as a foothold for further attacks within the organization’s network if integrated with other systems. The threat is particularly relevant for organizations with privileged users who have elevated access within the platform, as the vulnerability requires some level of privilege to exploit.
Mitigation Recommendations
To mitigate CVE-2025-1927, organizations should implement robust anti-CSRF protections immediately. This includes adding unique, unpredictable CSRF tokens to all state-changing requests and validating these tokens server-side. Enforce strict SameSite cookie attributes to limit cross-origin requests. Validate the HTTP Referer and Origin headers to ensure requests originate from trusted sources. Review and minimize user privileges to reduce the impact of compromised accounts. Employ multi-factor authentication to protect privileged accounts. Monitor logs for unusual request patterns indicative of CSRF attempts. If patches become available from Restajet, prioritize timely deployment. In the absence of patches, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF-like traffic. Conduct security awareness training to inform users about the risks of CSRF and safe browsing practices. Regularly audit the application for other potential CSRF vectors and ensure secure coding practices are followed in future development.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-1927: CWE-352 Cross-Site Request Forgery (CSRF) in Restajet Information Technologies Inc. Online Food Delivery System
Description
Cross-Site Request Forgery (CSRF) vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Cross Site Request Forgery.This issue affects Online Food Delivery System: through 19122025.
AI-Powered Analysis
Technical Analysis
CVE-2025-1927 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Online Food Delivery System developed by Restajet Information Technologies Inc. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, causing the victim’s browser to perform unwanted actions on a web application where they are logged in. This particular vulnerability affects versions up to 19122025 of the product. The CVSS 3.1 base score is 7.1, indicating a high severity issue with the following vector: network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), high integrity impact (I:H), and no availability impact (A:N). This means an attacker with some level of privileges can exploit the vulnerability remotely without user interaction to alter data integrity, such as modifying orders or user information. Although no public exploits are currently known, the vulnerability’s nature and impact make it a significant risk, especially for organizations relying on this platform for critical business operations. The lack of available patches at the time of publication necessitates immediate attention to mitigation strategies. The vulnerability stems from insufficient anti-CSRF protections, such as missing or ineffective CSRF tokens or inadequate validation of request origins, allowing malicious sites to forge requests that the server accepts as legitimate. Given the product’s role in processing sensitive transactions and personal data, exploitation could lead to unauthorized order manipulations, fraudulent transactions, or disruption of service integrity.
Potential Impact
For European organizations using the Restajet Online Food Delivery System, this vulnerability poses a risk of unauthorized manipulation of orders, user account changes, or other critical operations performed via the platform. The integrity of transaction data could be compromised, leading to financial losses, reputational damage, and potential regulatory non-compliance under GDPR due to unauthorized data modifications. The confidentiality impact is limited but not negligible, as some user data could be indirectly exposed or altered. Availability is not impacted, so service disruption is unlikely. However, the ease of exploitation from a network perspective and the lack of required user interaction increase the threat level. Food delivery services are critical infrastructure in many urban areas, and disruption or compromise could affect business continuity and customer trust. Additionally, attackers could leverage this vulnerability as a foothold for further attacks within the organization’s network if integrated with other systems. The threat is particularly relevant for organizations with privileged users who have elevated access within the platform, as the vulnerability requires some level of privilege to exploit.
Mitigation Recommendations
To mitigate CVE-2025-1927, organizations should implement robust anti-CSRF protections immediately. This includes adding unique, unpredictable CSRF tokens to all state-changing requests and validating these tokens server-side. Enforce strict SameSite cookie attributes to limit cross-origin requests. Validate the HTTP Referer and Origin headers to ensure requests originate from trusted sources. Review and minimize user privileges to reduce the impact of compromised accounts. Employ multi-factor authentication to protect privileged accounts. Monitor logs for unusual request patterns indicative of CSRF attempts. If patches become available from Restajet, prioritize timely deployment. In the absence of patches, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF-like traffic. Conduct security awareness training to inform users about the risks of CSRF and safe browsing practices. Regularly audit the application for other potential CSRF vectors and ensure secure coding practices are followed in future development.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- TR-CERT
- Date Reserved
- 2025-03-04T11:45:35.560Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69454096a90e3c9a152ce8bf
Added to database: 12/19/2025, 12:09:58 PM
Last enriched: 12/19/2025, 12:24:39 PM
Last updated: 12/19/2025, 2:15:38 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14950: SQL Injection in code-projects Scholars Tracking System
MediumCVE-2025-14946: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in Red Hat Red Hat Enterprise Linux 10
MediumCVE-2025-14882: CWE-639 Authorization Bypass Through User-Controlled Key in pretix pretix-offlinesales
LowCVE-2025-1928: CWE-307 Improper Restriction of Excessive Authentication Attempts in Restajet Information Technologies Inc. Online Food Delivery System
CriticalCVE-2025-1885: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Restajet Information Technologies Inc. Online Food Delivery System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.