CVE-2025-60168: Cross-Site Request Forgery (CSRF) in integrationshotelrunner HotelRunner Booking Widget
Cross-Site Request Forgery (CSRF) vulnerability in integrationshotelrunner HotelRunner Booking Widget hotelrunner allows Stored XSS.This issue affects HotelRunner Booking Widget: from n/a through <= 1.6.
AI Analysis
Technical Summary
CVE-2025-60168 is a Cross-Site Request Forgery (CSRF) vulnerability found in the HotelRunner Booking Widget developed by integrationshotelrunner, affecting versions up to and including 1.6. The vulnerability allows attackers to trick authenticated users into executing unwanted actions without their consent by exploiting the lack of proper CSRF protections. This can lead to stored Cross-Site Scripting (XSS) attacks, where malicious scripts are permanently injected into the widget’s data, potentially affecting all users who access the compromised booking interface. The vulnerability has a CVSS 3.1 score of 7.1, indicating high severity, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requiring user interaction. The scope is changed, meaning the attack can affect resources beyond the initially compromised component. The impact includes partial loss of confidentiality, integrity, and availability, as attackers can steal session tokens, manipulate booking data, or disrupt service availability. No patches or known exploits are currently documented, but the vulnerability is publicly disclosed and should be addressed promptly. The widget is commonly integrated into hotel and travel websites to facilitate online bookings, making it a critical component in the hospitality sector’s digital infrastructure.
Potential Impact
For European organizations, especially those in the hospitality and travel sectors, this vulnerability poses significant risks. Exploitation could lead to unauthorized manipulation of booking data, theft of customer information, session hijacking, and defacement or disruption of booking services. Such impacts can damage customer trust, lead to regulatory non-compliance (e.g., GDPR breaches due to data exposure), and cause financial losses from disrupted operations or remediation costs. The stored XSS aspect increases the risk by allowing persistent malicious code that can affect multiple users over time. Given the widget’s integration in customer-facing platforms, the attack surface is broad, potentially affecting numerous hotels and travel agencies across Europe. The vulnerability could also be leveraged as a foothold for further attacks within organizational networks if attackers gain access through compromised user sessions.
Mitigation Recommendations
1. Apply security patches from integrationshotelrunner as soon as they become available to address the CSRF vulnerability. 2. Implement robust anti-CSRF tokens in all state-changing requests within the booking widget to ensure requests originate from legitimate users. 3. Enforce strict input validation and output encoding to prevent stored XSS payloads from being injected or executed. 4. Conduct regular security audits and penetration testing focused on web application security, particularly on third-party integrations like booking widgets. 5. Monitor web server and application logs for unusual activities indicative of CSRF or XSS exploitation attempts. 6. Educate staff and users about phishing and social engineering risks that could facilitate CSRF attacks. 7. Consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block CSRF and XSS attack patterns. 8. Limit the widget’s permissions and isolate it within the web application architecture to reduce potential impact if compromised.
Affected Countries
Spain, Italy, France, Germany, United Kingdom
CVE-2025-60168: Cross-Site Request Forgery (CSRF) in integrationshotelrunner HotelRunner Booking Widget
Description
Cross-Site Request Forgery (CSRF) vulnerability in integrationshotelrunner HotelRunner Booking Widget hotelrunner allows Stored XSS.This issue affects HotelRunner Booking Widget: from n/a through <= 1.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-60168 is a Cross-Site Request Forgery (CSRF) vulnerability found in the HotelRunner Booking Widget developed by integrationshotelrunner, affecting versions up to and including 1.6. The vulnerability allows attackers to trick authenticated users into executing unwanted actions without their consent by exploiting the lack of proper CSRF protections. This can lead to stored Cross-Site Scripting (XSS) attacks, where malicious scripts are permanently injected into the widget’s data, potentially affecting all users who access the compromised booking interface. The vulnerability has a CVSS 3.1 score of 7.1, indicating high severity, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requiring user interaction. The scope is changed, meaning the attack can affect resources beyond the initially compromised component. The impact includes partial loss of confidentiality, integrity, and availability, as attackers can steal session tokens, manipulate booking data, or disrupt service availability. No patches or known exploits are currently documented, but the vulnerability is publicly disclosed and should be addressed promptly. The widget is commonly integrated into hotel and travel websites to facilitate online bookings, making it a critical component in the hospitality sector’s digital infrastructure.
Potential Impact
For European organizations, especially those in the hospitality and travel sectors, this vulnerability poses significant risks. Exploitation could lead to unauthorized manipulation of booking data, theft of customer information, session hijacking, and defacement or disruption of booking services. Such impacts can damage customer trust, lead to regulatory non-compliance (e.g., GDPR breaches due to data exposure), and cause financial losses from disrupted operations or remediation costs. The stored XSS aspect increases the risk by allowing persistent malicious code that can affect multiple users over time. Given the widget’s integration in customer-facing platforms, the attack surface is broad, potentially affecting numerous hotels and travel agencies across Europe. The vulnerability could also be leveraged as a foothold for further attacks within organizational networks if attackers gain access through compromised user sessions.
Mitigation Recommendations
1. Apply security patches from integrationshotelrunner as soon as they become available to address the CSRF vulnerability. 2. Implement robust anti-CSRF tokens in all state-changing requests within the booking widget to ensure requests originate from legitimate users. 3. Enforce strict input validation and output encoding to prevent stored XSS payloads from being injected or executed. 4. Conduct regular security audits and penetration testing focused on web application security, particularly on third-party integrations like booking widgets. 5. Monitor web server and application logs for unusual activities indicative of CSRF or XSS exploitation attempts. 6. Educate staff and users about phishing and social engineering risks that could facilitate CSRF attacks. 7. Consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block CSRF and XSS attack patterns. 8. Limit the widget’s permissions and isolate it within the web application architecture to reduce potential impact if compromised.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:28:09.603Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f8eff504677bbd79439a7e
Added to database: 10/22/2025, 2:53:41 PM
Last enriched: 1/20/2026, 9:42:57 PM
Last updated: 2/7/2026, 1:15:22 PM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.