CVE-2025-66531: Cross-Site Request Forgery (CSRF) in Dimitri Grassi Salon booking system
Cross-Site Request Forgery (CSRF) vulnerability in Dimitri Grassi Salon booking system salon-booking-system allows Cross Site Request Forgery.This issue affects Salon booking system: from n/a through <= 10.30.3.
AI Analysis
Technical Summary
The CVE-2025-66531 vulnerability is a Cross-Site Request Forgery (CSRF) issue found in the Dimitri Grassi Salon booking system, affecting versions up to and including 10.30.3. CSRF vulnerabilities allow attackers to induce authenticated users to perform unwanted actions on a web application where they are logged in, without their knowledge or consent. In this case, the attacker can craft malicious requests that, when executed by a logged-in user, could alter booking data, user information, or system settings. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No authentication is required for the attacker, but the victim must be logged in and interact with the malicious content. The vulnerability stems from insufficient validation of requests to ensure they originate from legitimate users, such as missing or ineffective anti-CSRF tokens or improper session validation. No patches or known exploits are currently reported, but the risk remains significant due to the nature of the affected system, which handles sensitive booking and potentially personal data. The Dimitri Grassi Salon booking system is used by various small to medium businesses, including those in Europe, making this vulnerability relevant for organizations relying on this software for client management and scheduling.
Potential Impact
For European organizations, exploitation of this CSRF vulnerability could lead to unauthorized changes in salon bookings, manipulation of customer data, and disruption of service availability. Confidential client information such as personal details and appointment histories could be exposed or altered, leading to privacy violations and regulatory non-compliance under GDPR. Integrity of booking data could be compromised, resulting in financial losses, reputational damage, and operational disruptions. Availability impacts could arise if attackers perform actions that degrade or disable booking functionalities, affecting customer experience and business continuity. Given the high CVSS score and the critical nature of the data handled, organizations face significant risks if the vulnerability is exploited. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the attack, increasing the threat vector. European salons and related businesses using this system are at risk of targeted attacks aiming to disrupt operations or steal sensitive client data.
Mitigation Recommendations
To mitigate CVE-2025-66531, organizations should immediately verify if they are running affected versions (up to 10.30.3) of the Dimitri Grassi Salon booking system and prioritize upgrading to a patched version once available. In the absence of an official patch, implement strict anti-CSRF protections such as synchronizer tokens or double-submit cookies to validate the origin of requests. Enforce SameSite cookie attributes to restrict cross-origin requests. Review and harden session management to detect and prevent unauthorized actions. Educate users about phishing and social engineering risks to reduce the likelihood of user interaction with malicious content. Employ web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts. Conduct regular security audits and penetration testing focusing on CSRF and session management controls. Monitor logs for unusual activity indicative of CSRF exploitation attempts. Finally, ensure compliance with data protection regulations by safeguarding client data and maintaining incident response readiness.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium
CVE-2025-66531: Cross-Site Request Forgery (CSRF) in Dimitri Grassi Salon booking system
Description
Cross-Site Request Forgery (CSRF) vulnerability in Dimitri Grassi Salon booking system salon-booking-system allows Cross Site Request Forgery.This issue affects Salon booking system: from n/a through <= 10.30.3.
AI-Powered Analysis
Technical Analysis
The CVE-2025-66531 vulnerability is a Cross-Site Request Forgery (CSRF) issue found in the Dimitri Grassi Salon booking system, affecting versions up to and including 10.30.3. CSRF vulnerabilities allow attackers to induce authenticated users to perform unwanted actions on a web application where they are logged in, without their knowledge or consent. In this case, the attacker can craft malicious requests that, when executed by a logged-in user, could alter booking data, user information, or system settings. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No authentication is required for the attacker, but the victim must be logged in and interact with the malicious content. The vulnerability stems from insufficient validation of requests to ensure they originate from legitimate users, such as missing or ineffective anti-CSRF tokens or improper session validation. No patches or known exploits are currently reported, but the risk remains significant due to the nature of the affected system, which handles sensitive booking and potentially personal data. The Dimitri Grassi Salon booking system is used by various small to medium businesses, including those in Europe, making this vulnerability relevant for organizations relying on this software for client management and scheduling.
Potential Impact
For European organizations, exploitation of this CSRF vulnerability could lead to unauthorized changes in salon bookings, manipulation of customer data, and disruption of service availability. Confidential client information such as personal details and appointment histories could be exposed or altered, leading to privacy violations and regulatory non-compliance under GDPR. Integrity of booking data could be compromised, resulting in financial losses, reputational damage, and operational disruptions. Availability impacts could arise if attackers perform actions that degrade or disable booking functionalities, affecting customer experience and business continuity. Given the high CVSS score and the critical nature of the data handled, organizations face significant risks if the vulnerability is exploited. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the attack, increasing the threat vector. European salons and related businesses using this system are at risk of targeted attacks aiming to disrupt operations or steal sensitive client data.
Mitigation Recommendations
To mitigate CVE-2025-66531, organizations should immediately verify if they are running affected versions (up to 10.30.3) of the Dimitri Grassi Salon booking system and prioritize upgrading to a patched version once available. In the absence of an official patch, implement strict anti-CSRF protections such as synchronizer tokens or double-submit cookies to validate the origin of requests. Enforce SameSite cookie attributes to restrict cross-origin requests. Review and harden session management to detect and prevent unauthorized actions. Educate users about phishing and social engineering risks to reduce the likelihood of user interaction with malicious content. Employ web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts. Conduct regular security audits and penetration testing focusing on CSRF and session management controls. Monitor logs for unusual activity indicative of CSRF exploitation attempts. Finally, ensure compliance with data protection regulations by safeguarding client data and maintaining incident response readiness.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-04T04:07:13.047Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693833a029cea75c35ae51dc
Added to database: 12/9/2025, 2:35:12 PM
Last enriched: 1/21/2026, 12:43:00 AM
Last updated: 2/7/2026, 11:03:32 AM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.