Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0658: CWE-352 Cross-Site Request Forgery (CSRF) in Five Star Restaurant Reservations

0
Medium
VulnerabilityCVE-2026-0658cvecve-2026-0658cwe-352
Published: Mon Feb 02 2026 (02/02/2026, 06:00:03 UTC)
Source: CVE Database V5
Product: Five Star Restaurant Reservations

Description

The Five Star Restaurant Reservations WordPress plugin before 2.7.9 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting bookings via CSRF attacks.

AI-Powered Analysis

AILast updated: 02/02/2026, 06:42:08 UTC

Technical Analysis

CVE-2026-0658 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Five Star Restaurant Reservations WordPress plugin prior to version 2.7.9. The vulnerability stems from missing CSRF token validation in some bulk action functionalities within the plugin. CSRF attacks exploit the trust a web application places in a logged-in user by tricking that user into submitting unintended requests. In this case, an attacker can craft a malicious webpage or link that, when visited by an authenticated administrator of a WordPress site using the vulnerable plugin, triggers unauthorized bulk actions such as deleting multiple bookings. This can lead to loss of critical reservation data and disrupt business operations. The vulnerability requires the attacker to have the victim logged in with administrative privileges, and the victim must interact with the attack vector (e.g., visiting a malicious site). There are no known public exploits or patches currently available, and the CVSS score has not been assigned. The vulnerability is classified under CWE-352, which covers CSRF weaknesses. The plugin is widely used in hospitality-related WordPress sites, making it a relevant threat to organizations managing restaurant reservations online.

Potential Impact

For European organizations, particularly those in the hospitality and restaurant sectors relying on WordPress with the Five Star Restaurant Reservations plugin, this vulnerability could lead to unauthorized deletion of booking data, causing operational disruption and reputational damage. Loss of reservation data can result in customer dissatisfaction, financial loss, and potential legal consequences under data protection regulations such as GDPR if customer information is affected. The integrity and availability of reservation systems are at risk, potentially impacting business continuity. Since the attack requires administrative credentials and user interaction, the risk is somewhat mitigated but remains significant for organizations with multiple administrators or less stringent user security awareness. The disruption could be more severe for large-scale restaurant chains or booking platforms operating across multiple European countries.

Mitigation Recommendations

1. Immediately monitor for updates to the Five Star Restaurant Reservations plugin and apply version 2.7.9 or later once released, as it will likely contain the necessary CSRF protections. 2. Until an official patch is available, implement web application firewall (WAF) rules to detect and block suspicious CSRF attack patterns targeting bulk action endpoints of the plugin. 3. Educate WordPress administrators to avoid clicking on untrusted links or visiting suspicious websites while logged into admin accounts. 4. Limit the number of users with administrative privileges to reduce the attack surface. 5. Consider deploying additional CSRF tokens or nonce validation mechanisms via custom plugin modifications or security plugins that enhance CSRF protections. 6. Regularly back up reservation data to enable recovery in case of data deletion. 7. Conduct security audits and penetration testing focused on WordPress plugins to identify similar vulnerabilities proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2026-01-06T19:46:02.313Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698043e3ac06320222c1dd0e

Added to database: 2/2/2026, 6:27:47 AM

Last enriched: 2/2/2026, 6:42:08 AM

Last updated: 2/7/2026, 2:40:07 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats