CVE-2025-39351: CWE-352 Cross-Site Request Forgery (CSRF) in ThemeGoods Grand Restaurant WordPress
Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Restaurant WordPress allows Cross Site Request Forgery.This issue affects Grand Restaurant WordPress: from n/a through 7.0.
AI Analysis
Technical Summary
CVE-2025-39351 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the ThemeGoods Grand Restaurant WordPress theme, affecting versions up to 7.0. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing the application to perform unwanted actions on behalf of the user without their consent. In this case, the vulnerability allows an attacker to exploit the lack of proper CSRF protections in the Grand Restaurant WordPress theme, potentially enabling unauthorized state-changing operations. The CVSS 3.1 base score of 4.3 reflects a medium severity level, indicating that the vulnerability requires no privileges (PR:N), can be exploited remotely over the network (AV:N), and requires user interaction (UI:R). The impact is limited to integrity (I:L) with no direct confidentiality or availability consequences. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which is a common web security weakness related to CSRF attacks. Since WordPress themes often have administrative or content management capabilities, exploitation could lead to unauthorized changes in website content or configuration, potentially undermining the trustworthiness and functionality of affected sites.
Potential Impact
For European organizations using the Grand Restaurant WordPress theme, this vulnerability could lead to unauthorized modifications of website content or settings if an authenticated user is tricked into executing malicious requests. This could damage brand reputation, misinform customers, or disrupt online services, especially for hospitality businesses relying on their websites for reservations and customer engagement. While the vulnerability does not directly compromise sensitive data confidentiality or availability, integrity violations can still have significant operational and reputational impacts. Given the medium severity and requirement for user interaction, the risk is moderate but should not be underestimated, particularly for organizations with high web traffic or those targeted by phishing campaigns. Additionally, compromised websites could be leveraged as part of broader attack chains or for defacement, which may attract regulatory scrutiny under GDPR if customer trust or data is indirectly affected.
Mitigation Recommendations
Organizations should immediately verify if they are using the ThemeGoods Grand Restaurant WordPress theme version 7.0 or earlier and monitor for official patches or updates from the vendor. Until patches are available, administrators should implement compensating controls such as enforcing strict Content Security Policies (CSP) to limit the impact of forged requests, employing web application firewalls (WAFs) with CSRF detection rules, and educating users about phishing and social engineering risks to reduce the likelihood of user interaction exploitation. Additionally, restricting administrative access to trusted networks or VPNs and enabling multi-factor authentication (MFA) can reduce the risk of unauthorized actions. Regularly auditing website logs for suspicious activity and disabling or limiting unnecessary theme features that accept state-changing requests can further mitigate exposure. Finally, maintaining up-to-date backups will facilitate recovery if unauthorized changes occur.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-39351: CWE-352 Cross-Site Request Forgery (CSRF) in ThemeGoods Grand Restaurant WordPress
Description
Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Restaurant WordPress allows Cross Site Request Forgery.This issue affects Grand Restaurant WordPress: from n/a through 7.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-39351 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the ThemeGoods Grand Restaurant WordPress theme, affecting versions up to 7.0. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing the application to perform unwanted actions on behalf of the user without their consent. In this case, the vulnerability allows an attacker to exploit the lack of proper CSRF protections in the Grand Restaurant WordPress theme, potentially enabling unauthorized state-changing operations. The CVSS 3.1 base score of 4.3 reflects a medium severity level, indicating that the vulnerability requires no privileges (PR:N), can be exploited remotely over the network (AV:N), and requires user interaction (UI:R). The impact is limited to integrity (I:L) with no direct confidentiality or availability consequences. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which is a common web security weakness related to CSRF attacks. Since WordPress themes often have administrative or content management capabilities, exploitation could lead to unauthorized changes in website content or configuration, potentially undermining the trustworthiness and functionality of affected sites.
Potential Impact
For European organizations using the Grand Restaurant WordPress theme, this vulnerability could lead to unauthorized modifications of website content or settings if an authenticated user is tricked into executing malicious requests. This could damage brand reputation, misinform customers, or disrupt online services, especially for hospitality businesses relying on their websites for reservations and customer engagement. While the vulnerability does not directly compromise sensitive data confidentiality or availability, integrity violations can still have significant operational and reputational impacts. Given the medium severity and requirement for user interaction, the risk is moderate but should not be underestimated, particularly for organizations with high web traffic or those targeted by phishing campaigns. Additionally, compromised websites could be leveraged as part of broader attack chains or for defacement, which may attract regulatory scrutiny under GDPR if customer trust or data is indirectly affected.
Mitigation Recommendations
Organizations should immediately verify if they are using the ThemeGoods Grand Restaurant WordPress theme version 7.0 or earlier and monitor for official patches or updates from the vendor. Until patches are available, administrators should implement compensating controls such as enforcing strict Content Security Policies (CSP) to limit the impact of forged requests, employing web application firewalls (WAFs) with CSRF detection rules, and educating users about phishing and social engineering risks to reduce the likelihood of user interaction exploitation. Additionally, restricting administrative access to trusted networks or VPNs and enabling multi-factor authentication (MFA) can reduce the risk of unauthorized actions. Regularly auditing website logs for suspicious activity and disabling or limiting unnecessary theme features that accept state-changing requests can further mitigate exposure. Finally, maintaining up-to-date backups will facilitate recovery if unauthorized changes occur.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-04-16T06:22:10.074Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb549
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 5:04:49 PM
Last updated: 7/30/2025, 4:08:05 PM
Views: 11
Related Threats
CVE-2025-5048: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Autodesk AutoCAD
HighCVE-2025-5047: CWE-457: Use of Uninitialized Variable in Autodesk AutoCAD
HighCVE-2025-5046: CWE-125 Out-of-Bounds Read in Autodesk AutoCAD
HighCVE-2025-54466: CWE-94 Improper Control of Generation of Code ('Code Injection') in Apache Software Foundation Apache OFBiz
CriticalCVE-2025-9053: SQL Injection in projectworlds Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.