Skip to main content

CVE-2025-47583: CWE-352 Cross-Site Request Forgery (CSRF) in Dimitri Grassi Salon booking system

Medium
VulnerabilityCVE-2025-47583cvecve-2025-47583cwe-352
Published: Mon May 19 2025 (05/19/2025, 16:07:01 UTC)
Source: CVE
Vendor/Project: Dimitri Grassi
Product: Salon booking system

Description

Unauthenticated Cross Site Request Forgery (CSRF) in Salon booking system <= 10.16 versions.

AI-Powered Analysis

AILast updated: 07/11/2025, 17:33:12 UTC

Technical Analysis

CVE-2025-47583 is a medium-severity vulnerability classified as CWE-352, which corresponds to Cross-Site Request Forgery (CSRF). This vulnerability affects the Dimitri Grassi Salon booking system, specifically versions up to and including 10.16. The flaw allows an unauthenticated attacker to perform CSRF attacks, meaning the attacker can trick a logged-in user into submitting unwanted requests to the application without their consent. The CVSS 3.1 base score is 5.4, reflecting a medium impact with the vector AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L. This indicates the attack can be performed remotely over the network without any privileges and requires user interaction (such as clicking a malicious link). The scope remains unchanged, and the impact affects integrity and availability but not confidentiality. The vulnerability could allow an attacker to alter booking data or disrupt service availability by forcing unintended actions on behalf of the user. No patches or known exploits in the wild have been reported at the time of publication. The absence of patch links suggests that remediation may require vendor intervention or configuration changes. The vulnerability is notable because it does not require authentication, increasing the attack surface, and targets a system that manages customer appointments, which is critical for business operations in the service industry.

Potential Impact

For European organizations using the Dimitri Grassi Salon booking system, this vulnerability poses a risk to operational integrity and service availability. Attackers could manipulate booking data, causing disruptions such as double bookings, cancellations, or unauthorized changes, which can degrade customer trust and business reputation. The availability impact could lead to denial of service conditions for legitimate users, affecting revenue and customer satisfaction. While confidentiality is not directly impacted, the integrity and availability issues could indirectly affect compliance with data protection regulations like GDPR if service disruptions lead to data handling errors or loss of customer trust. Small and medium-sized enterprises (SMEs) in the personal care and salon industry across Europe, which often rely on such booking systems, may be particularly vulnerable due to limited cybersecurity resources. The unauthenticated nature of the vulnerability means attackers do not need credentials, increasing the likelihood of exploitation if user interaction can be socially engineered. Given the widespread use of web-based booking systems in Europe, the threat could have broad implications if not mitigated promptly.

Mitigation Recommendations

To mitigate CVE-2025-47583, organizations should implement anti-CSRF tokens in all state-changing requests within the Dimitri Grassi Salon booking system. This involves ensuring that every form or request that modifies data includes a unique, unpredictable token that the server validates before processing the request. Additionally, enforcing the SameSite cookie attribute can help reduce CSRF risks by restricting cross-origin requests. Organizations should also educate users about the risks of clicking on suspicious links or visiting untrusted websites to reduce the likelihood of user interaction exploitation. Network-level protections such as Web Application Firewalls (WAFs) can be configured to detect and block suspicious CSRF patterns. Since no official patches are currently available, organizations should engage with the vendor for updates or consider temporary workarounds such as restricting access to the booking system via VPN or IP whitelisting. Regular security assessments and penetration testing focused on CSRF and other web vulnerabilities should be conducted to identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T09:55:31.578Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb583

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 5:33:12 PM

Last updated: 7/30/2025, 4:08:05 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats