Skip to main content

CVE-2025-54038: CWE-352 Cross-Site Request Forgery (CSRF) in jetmonsters Restaurant Menu by MotoPress

Medium
VulnerabilityCVE-2025-54038cvecve-2025-54038cwe-352
Published: Wed Jul 16 2025 (07/16/2025, 10:36:49 UTC)
Source: CVE Database V5
Vendor/Project: jetmonsters
Product: Restaurant Menu by MotoPress

Description

Cross-Site Request Forgery (CSRF) vulnerability in jetmonsters Restaurant Menu by MotoPress allows Cross Site Request Forgery. This issue affects Restaurant Menu by MotoPress: from n/a through 2.4.6.

AI-Powered Analysis

AILast updated: 07/16/2025, 11:04:04 UTC

Technical Analysis

CVE-2025-54038 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the 'Restaurant Menu by MotoPress' plugin developed by jetmonsters. This vulnerability affects versions up to and including 2.4.6. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged HTTP request to a web application, causing the application to perform unwanted actions on behalf of the user without their consent. In this case, the vulnerability exists in the Restaurant Menu plugin, which is commonly used in WordPress environments to manage and display restaurant menus. The CVSS v3.1 base score is 5.4, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) reveals that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The scope remains unchanged (S:U). The impact affects integrity and availability (I:L, A:L) but not confidentiality (C:N). This means an attacker could potentially cause unauthorized changes or disruptions to the plugin's functionality or data, but cannot directly access confidential information. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability stems from insufficient anti-CSRF protections, such as missing or inadequate CSRF tokens in state-changing requests, allowing attackers to craft malicious links or forms that, when visited or submitted by authenticated users, trigger unintended actions within the plugin. Given the plugin's role in managing restaurant menus, such unauthorized actions could include altering menu items, prices, or availability, potentially leading to misinformation or disruption of business operations.

Potential Impact

For European organizations, particularly those in the hospitality and food service sectors using WordPress with the Restaurant Menu by MotoPress plugin, this vulnerability poses a risk of unauthorized modification or disruption of online menu data. This can lead to reputational damage, customer confusion, and potential financial loss if menus are altered maliciously or services disrupted. While the vulnerability does not expose confidential data, the integrity and availability impacts could affect customer trust and operational continuity. Additionally, organizations relying on online ordering or reservation systems integrated with the plugin may experience service interruptions. The medium severity suggests that while the threat is not critical, it should not be ignored, especially for businesses where accurate menu information is essential. The requirement for user interaction means phishing or social engineering could be used to exploit this vulnerability, increasing the risk if employees or administrators are targeted. European organizations must consider the regulatory implications under GDPR if service disruptions impact customer experience or data processing continuity.

Mitigation Recommendations

To mitigate this CSRF vulnerability, organizations should: 1) Immediately check for and apply any official patches or updates from jetmonsters or MotoPress once available. 2) If patches are not yet available, implement web application firewall (WAF) rules to detect and block suspicious CSRF attack patterns targeting the plugin's endpoints. 3) Review and harden user roles and permissions within WordPress to limit the number of users who can perform sensitive actions via the plugin. 4) Educate users and administrators about phishing and social engineering risks, emphasizing caution when clicking on unsolicited links or submitting forms. 5) Employ additional CSRF protection mechanisms at the application or server level, such as verifying the HTTP Referer header or implementing custom nonce tokens for critical actions if feasible. 6) Monitor logs for unusual activity related to the plugin, such as unexpected menu changes or administrative actions. 7) Consider temporarily disabling the plugin or restricting access to its administrative interfaces until a patch is applied if the risk is deemed high. These steps go beyond generic advice by focusing on compensating controls and operational security measures tailored to the plugin's context and the nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-07-16T08:51:58.890Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687782fba83201eaacd97980

Added to database: 7/16/2025, 10:46:19 AM

Last enriched: 7/16/2025, 11:04:04 AM

Last updated: 8/10/2025, 7:28:25 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats