CVE-2025-39351: CWE-352 Cross-Site Request Forgery (CSRF) in ThemeGoods Grand Restaurant WordPress
Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Restaurant WordPress allows Cross Site Request Forgery.This issue affects Grand Restaurant WordPress: from n/a through 7.0.
AI Analysis
Technical Summary
CVE-2025-39351 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the ThemeGoods Grand Restaurant WordPress theme, affecting versions up to 7.0. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing the application to perform unwanted actions on behalf of the user without their consent. In this case, the vulnerability allows an attacker to exploit the lack of proper CSRF protections in the Grand Restaurant WordPress theme, potentially enabling unauthorized state-changing operations. The CVSS 3.1 base score of 4.3 reflects a medium severity level, indicating that the vulnerability requires no privileges (PR:N), can be exploited remotely over the network (AV:N), and requires user interaction (UI:R). The impact is limited to integrity (I:L) with no direct confidentiality or availability consequences. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which is a common web security weakness related to CSRF attacks. Since WordPress themes often have administrative or content management capabilities, exploitation could lead to unauthorized changes in website content or configuration, potentially undermining the trustworthiness and functionality of affected sites.
Potential Impact
For European organizations using the Grand Restaurant WordPress theme, this vulnerability could lead to unauthorized modifications of website content or settings if an authenticated user is tricked into executing malicious requests. This could damage brand reputation, misinform customers, or disrupt online services, especially for hospitality businesses relying on their websites for reservations and customer engagement. While the vulnerability does not directly compromise sensitive data confidentiality or availability, integrity violations can still have significant operational and reputational impacts. Given the medium severity and requirement for user interaction, the risk is moderate but should not be underestimated, particularly for organizations with high web traffic or those targeted by phishing campaigns. Additionally, compromised websites could be leveraged as part of broader attack chains or for defacement, which may attract regulatory scrutiny under GDPR if customer trust or data is indirectly affected.
Mitigation Recommendations
Organizations should immediately verify if they are using the ThemeGoods Grand Restaurant WordPress theme version 7.0 or earlier and monitor for official patches or updates from the vendor. Until patches are available, administrators should implement compensating controls such as enforcing strict Content Security Policies (CSP) to limit the impact of forged requests, employing web application firewalls (WAFs) with CSRF detection rules, and educating users about phishing and social engineering risks to reduce the likelihood of user interaction exploitation. Additionally, restricting administrative access to trusted networks or VPNs and enabling multi-factor authentication (MFA) can reduce the risk of unauthorized actions. Regularly auditing website logs for suspicious activity and disabling or limiting unnecessary theme features that accept state-changing requests can further mitigate exposure. Finally, maintaining up-to-date backups will facilitate recovery if unauthorized changes occur.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-39351: CWE-352 Cross-Site Request Forgery (CSRF) in ThemeGoods Grand Restaurant WordPress
Description
Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Restaurant WordPress allows Cross Site Request Forgery.This issue affects Grand Restaurant WordPress: from n/a through 7.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-39351 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the ThemeGoods Grand Restaurant WordPress theme, affecting versions up to 7.0. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing the application to perform unwanted actions on behalf of the user without their consent. In this case, the vulnerability allows an attacker to exploit the lack of proper CSRF protections in the Grand Restaurant WordPress theme, potentially enabling unauthorized state-changing operations. The CVSS 3.1 base score of 4.3 reflects a medium severity level, indicating that the vulnerability requires no privileges (PR:N), can be exploited remotely over the network (AV:N), and requires user interaction (UI:R). The impact is limited to integrity (I:L) with no direct confidentiality or availability consequences. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which is a common web security weakness related to CSRF attacks. Since WordPress themes often have administrative or content management capabilities, exploitation could lead to unauthorized changes in website content or configuration, potentially undermining the trustworthiness and functionality of affected sites.
Potential Impact
For European organizations using the Grand Restaurant WordPress theme, this vulnerability could lead to unauthorized modifications of website content or settings if an authenticated user is tricked into executing malicious requests. This could damage brand reputation, misinform customers, or disrupt online services, especially for hospitality businesses relying on their websites for reservations and customer engagement. While the vulnerability does not directly compromise sensitive data confidentiality or availability, integrity violations can still have significant operational and reputational impacts. Given the medium severity and requirement for user interaction, the risk is moderate but should not be underestimated, particularly for organizations with high web traffic or those targeted by phishing campaigns. Additionally, compromised websites could be leveraged as part of broader attack chains or for defacement, which may attract regulatory scrutiny under GDPR if customer trust or data is indirectly affected.
Mitigation Recommendations
Organizations should immediately verify if they are using the ThemeGoods Grand Restaurant WordPress theme version 7.0 or earlier and monitor for official patches or updates from the vendor. Until patches are available, administrators should implement compensating controls such as enforcing strict Content Security Policies (CSP) to limit the impact of forged requests, employing web application firewalls (WAFs) with CSRF detection rules, and educating users about phishing and social engineering risks to reduce the likelihood of user interaction exploitation. Additionally, restricting administrative access to trusted networks or VPNs and enabling multi-factor authentication (MFA) can reduce the risk of unauthorized actions. Regularly auditing website logs for suspicious activity and disabling or limiting unnecessary theme features that accept state-changing requests can further mitigate exposure. Finally, maintaining up-to-date backups will facilitate recovery if unauthorized changes occur.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-04-16T06:22:10.074Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb549
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 5:04:49 PM
Last updated: 11/22/2025, 7:37:05 PM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
MediumCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.