Skip to main content

CVE-2025-39351: CWE-352 Cross-Site Request Forgery (CSRF) in ThemeGoods Grand Restaurant WordPress

Medium
VulnerabilityCVE-2025-39351cvecve-2025-39351cwe-352
Published: Mon May 19 2025 (05/19/2025, 16:30:03 UTC)
Source: CVE
Vendor/Project: ThemeGoods
Product: Grand Restaurant WordPress

Description

Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Restaurant WordPress allows Cross Site Request Forgery.This issue affects Grand Restaurant WordPress: from n/a through 7.0.

AI-Powered Analysis

AILast updated: 07/11/2025, 17:04:49 UTC

Technical Analysis

CVE-2025-39351 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the ThemeGoods Grand Restaurant WordPress theme, affecting versions up to 7.0. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing the application to perform unwanted actions on behalf of the user without their consent. In this case, the vulnerability allows an attacker to exploit the lack of proper CSRF protections in the Grand Restaurant WordPress theme, potentially enabling unauthorized state-changing operations. The CVSS 3.1 base score of 4.3 reflects a medium severity level, indicating that the vulnerability requires no privileges (PR:N), can be exploited remotely over the network (AV:N), and requires user interaction (UI:R). The impact is limited to integrity (I:L) with no direct confidentiality or availability consequences. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which is a common web security weakness related to CSRF attacks. Since WordPress themes often have administrative or content management capabilities, exploitation could lead to unauthorized changes in website content or configuration, potentially undermining the trustworthiness and functionality of affected sites.

Potential Impact

For European organizations using the Grand Restaurant WordPress theme, this vulnerability could lead to unauthorized modifications of website content or settings if an authenticated user is tricked into executing malicious requests. This could damage brand reputation, misinform customers, or disrupt online services, especially for hospitality businesses relying on their websites for reservations and customer engagement. While the vulnerability does not directly compromise sensitive data confidentiality or availability, integrity violations can still have significant operational and reputational impacts. Given the medium severity and requirement for user interaction, the risk is moderate but should not be underestimated, particularly for organizations with high web traffic or those targeted by phishing campaigns. Additionally, compromised websites could be leveraged as part of broader attack chains or for defacement, which may attract regulatory scrutiny under GDPR if customer trust or data is indirectly affected.

Mitigation Recommendations

Organizations should immediately verify if they are using the ThemeGoods Grand Restaurant WordPress theme version 7.0 or earlier and monitor for official patches or updates from the vendor. Until patches are available, administrators should implement compensating controls such as enforcing strict Content Security Policies (CSP) to limit the impact of forged requests, employing web application firewalls (WAFs) with CSRF detection rules, and educating users about phishing and social engineering risks to reduce the likelihood of user interaction exploitation. Additionally, restricting administrative access to trusted networks or VPNs and enabling multi-factor authentication (MFA) can reduce the risk of unauthorized actions. Regularly auditing website logs for suspicious activity and disabling or limiting unnecessary theme features that accept state-changing requests can further mitigate exposure. Finally, maintaining up-to-date backups will facilitate recovery if unauthorized changes occur.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:22:10.074Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb549

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 5:04:49 PM

Last updated: 7/30/2025, 4:08:05 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats