CVE-2025-7965: CWE-352 Cross-Site Request Forgery (CSRF) in CBX Restaurant Booking
The CBX Restaurant Booking WordPress plugin through 1.2.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
AI Analysis
Technical Summary
CVE-2025-7965 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the CBX Restaurant Booking plugin for WordPress, affecting versions up to 1.2.1. The vulnerability arises because the plugin does not implement CSRF tokens or other anti-CSRF mechanisms when processing requests to update its settings. This security oversight allows an attacker to craft a malicious web request that, when visited by an authenticated administrator, can cause unauthorized changes to the plugin's configuration. The attack vector requires the victim to be logged into the WordPress admin panel and to interact with a maliciously crafted link or webpage, which triggers the settings update without the administrator's explicit consent. The vulnerability impacts the integrity of the system by enabling unauthorized configuration changes but does not directly compromise confidentiality or availability. The CVSS 3.1 base score is 4.3, indicating a medium severity, with the vector string AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N, meaning the attack can be performed remotely without privileges but requires user interaction and affects only integrity. No public exploits or patches are currently available, highlighting the need for proactive mitigation. The plugin is typically used by restaurants and hospitality businesses to manage bookings on WordPress sites, making it a targeted vector for attackers aiming to disrupt or manipulate online reservation systems.
Potential Impact
For European organizations, particularly those in the hospitality and restaurant sectors using WordPress with the CBX Restaurant Booking plugin, this vulnerability poses a risk of unauthorized administrative changes. Such changes could disrupt booking operations, alter pricing or availability, or introduce malicious configurations that degrade service integrity. While the vulnerability does not expose sensitive data or cause denial of service directly, unauthorized configuration changes can lead to operational disruptions and loss of customer trust. Given the widespread use of WordPress in Europe and the importance of online booking systems for restaurants, exploitation could have financial and reputational impacts. Additionally, if attackers leverage this vulnerability as part of a broader attack chain, it could facilitate further compromise of the affected websites. The requirement for administrator interaction limits the scope somewhat but does not eliminate risk, especially in environments with less stringent user awareness or where phishing attacks are common.
Mitigation Recommendations
To mitigate CVE-2025-7965, organizations should first check for updates or patches from the CBX Restaurant Booking plugin developers and apply them promptly once available. In the absence of an official patch, administrators can implement web application firewall (WAF) rules to detect and block suspicious POST requests targeting the plugin's settings endpoints. Enforcing strict Content Security Policy (CSP) headers and SameSite cookie attributes can reduce the risk of CSRF attacks by limiting cross-origin requests. Additionally, administrators should be trained to avoid clicking on suspicious links while logged into the WordPress admin panel. Restricting administrative access to trusted IP addresses and enabling multi-factor authentication (MFA) for WordPress admin accounts can further reduce the risk of exploitation. Regularly auditing plugin configurations and monitoring logs for unusual changes can help detect exploitation attempts early. Finally, organizations should consider isolating critical booking systems or using alternative plugins with stronger security postures if timely patching is not feasible.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Sweden, Austria, Ireland
CVE-2025-7965: CWE-352 Cross-Site Request Forgery (CSRF) in CBX Restaurant Booking
Description
The CBX Restaurant Booking WordPress plugin through 1.2.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
AI-Powered Analysis
Technical Analysis
CVE-2025-7965 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the CBX Restaurant Booking plugin for WordPress, affecting versions up to 1.2.1. The vulnerability arises because the plugin does not implement CSRF tokens or other anti-CSRF mechanisms when processing requests to update its settings. This security oversight allows an attacker to craft a malicious web request that, when visited by an authenticated administrator, can cause unauthorized changes to the plugin's configuration. The attack vector requires the victim to be logged into the WordPress admin panel and to interact with a maliciously crafted link or webpage, which triggers the settings update without the administrator's explicit consent. The vulnerability impacts the integrity of the system by enabling unauthorized configuration changes but does not directly compromise confidentiality or availability. The CVSS 3.1 base score is 4.3, indicating a medium severity, with the vector string AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N, meaning the attack can be performed remotely without privileges but requires user interaction and affects only integrity. No public exploits or patches are currently available, highlighting the need for proactive mitigation. The plugin is typically used by restaurants and hospitality businesses to manage bookings on WordPress sites, making it a targeted vector for attackers aiming to disrupt or manipulate online reservation systems.
Potential Impact
For European organizations, particularly those in the hospitality and restaurant sectors using WordPress with the CBX Restaurant Booking plugin, this vulnerability poses a risk of unauthorized administrative changes. Such changes could disrupt booking operations, alter pricing or availability, or introduce malicious configurations that degrade service integrity. While the vulnerability does not expose sensitive data or cause denial of service directly, unauthorized configuration changes can lead to operational disruptions and loss of customer trust. Given the widespread use of WordPress in Europe and the importance of online booking systems for restaurants, exploitation could have financial and reputational impacts. Additionally, if attackers leverage this vulnerability as part of a broader attack chain, it could facilitate further compromise of the affected websites. The requirement for administrator interaction limits the scope somewhat but does not eliminate risk, especially in environments with less stringent user awareness or where phishing attacks are common.
Mitigation Recommendations
To mitigate CVE-2025-7965, organizations should first check for updates or patches from the CBX Restaurant Booking plugin developers and apply them promptly once available. In the absence of an official patch, administrators can implement web application firewall (WAF) rules to detect and block suspicious POST requests targeting the plugin's settings endpoints. Enforcing strict Content Security Policy (CSP) headers and SameSite cookie attributes can reduce the risk of CSRF attacks by limiting cross-origin requests. Additionally, administrators should be trained to avoid clicking on suspicious links while logged into the WordPress admin panel. Restricting administrative access to trusted IP addresses and enabling multi-factor authentication (MFA) for WordPress admin accounts can further reduce the risk of exploitation. Regularly auditing plugin configurations and monitoring logs for unusual changes can help detect exploitation attempts early. Finally, organizations should consider isolating critical booking systems or using alternative plugins with stronger security postures if timely patching is not feasible.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-07-21T17:55:20.962Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6899878fad5a09ad0021344b
Added to database: 8/11/2025, 6:02:55 AM
Last enriched: 1/9/2026, 8:50:37 PM
Last updated: 2/7/2026, 2:07:17 PM
Views: 107
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.