Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1927: CWE-352 Cross-Site Request Forgery (CSRF) in Restajet Information Technologies Inc. Online Food Delivery System

0
High
VulnerabilityCVE-2025-1927cvecve-2025-1927cwe-352
Published: Fri Dec 19 2025 (12/19/2025, 12:01:03 UTC)
Source: CVE Database V5
Vendor/Project: Restajet Information Technologies Inc.
Product: Online Food Delivery System

Description

Cross-Site Request Forgery (CSRF) vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Cross Site Request Forgery.This issue affects Online Food Delivery System: through 19122025.

AI-Powered Analysis

AILast updated: 12/19/2025, 12:24:39 UTC

Technical Analysis

CVE-2025-1927 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Online Food Delivery System developed by Restajet Information Technologies Inc. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, causing the victim’s browser to perform unwanted actions on a web application where they are logged in. This particular vulnerability affects versions up to 19122025 of the product. The CVSS 3.1 base score is 7.1, indicating a high severity issue with the following vector: network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), high integrity impact (I:H), and no availability impact (A:N). This means an attacker with some level of privileges can exploit the vulnerability remotely without user interaction to alter data integrity, such as modifying orders or user information. Although no public exploits are currently known, the vulnerability’s nature and impact make it a significant risk, especially for organizations relying on this platform for critical business operations. The lack of available patches at the time of publication necessitates immediate attention to mitigation strategies. The vulnerability stems from insufficient anti-CSRF protections, such as missing or ineffective CSRF tokens or inadequate validation of request origins, allowing malicious sites to forge requests that the server accepts as legitimate. Given the product’s role in processing sensitive transactions and personal data, exploitation could lead to unauthorized order manipulations, fraudulent transactions, or disruption of service integrity.

Potential Impact

For European organizations using the Restajet Online Food Delivery System, this vulnerability poses a risk of unauthorized manipulation of orders, user account changes, or other critical operations performed via the platform. The integrity of transaction data could be compromised, leading to financial losses, reputational damage, and potential regulatory non-compliance under GDPR due to unauthorized data modifications. The confidentiality impact is limited but not negligible, as some user data could be indirectly exposed or altered. Availability is not impacted, so service disruption is unlikely. However, the ease of exploitation from a network perspective and the lack of required user interaction increase the threat level. Food delivery services are critical infrastructure in many urban areas, and disruption or compromise could affect business continuity and customer trust. Additionally, attackers could leverage this vulnerability as a foothold for further attacks within the organization’s network if integrated with other systems. The threat is particularly relevant for organizations with privileged users who have elevated access within the platform, as the vulnerability requires some level of privilege to exploit.

Mitigation Recommendations

To mitigate CVE-2025-1927, organizations should implement robust anti-CSRF protections immediately. This includes adding unique, unpredictable CSRF tokens to all state-changing requests and validating these tokens server-side. Enforce strict SameSite cookie attributes to limit cross-origin requests. Validate the HTTP Referer and Origin headers to ensure requests originate from trusted sources. Review and minimize user privileges to reduce the impact of compromised accounts. Employ multi-factor authentication to protect privileged accounts. Monitor logs for unusual request patterns indicative of CSRF attempts. If patches become available from Restajet, prioritize timely deployment. In the absence of patches, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF-like traffic. Conduct security awareness training to inform users about the risks of CSRF and safe browsing practices. Regularly audit the application for other potential CSRF vectors and ensure secure coding practices are followed in future development.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-03-04T11:45:35.560Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69454096a90e3c9a152ce8bf

Added to database: 12/19/2025, 12:09:58 PM

Last enriched: 12/19/2025, 12:24:39 PM

Last updated: 12/19/2025, 2:15:38 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats