CVE-2025-1927

7.1 HIGH

📋 TL;DR

This CSRF vulnerability in Restajet Online Food Delivery System allows attackers to trick authenticated users into performing unintended actions on the web application. All users of the affected system are vulnerable if they visit malicious websites while authenticated. The vulnerability affects all versions through December 19, 2025.

💻 Affected Systems

Products:
  • Restajet Information Technologies Inc. Online Food Delivery System
Versions: through 19122025 (all versions through December 19, 2025)
Operating Systems: Any OS running the web application
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of the affected versions are vulnerable regardless of configuration. The vulnerability exists in the web application itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could change user passwords, modify orders, alter payment information, or perform administrative actions on behalf of authenticated users, potentially leading to data theft, financial loss, or system compromise.

🟠

Likely Case

Attackers create malicious websites that trick users into performing actions like changing their profile information, placing unwanted orders, or modifying delivery addresses without their knowledge.

🟢

If Mitigated

With proper CSRF protections, users would be protected from unauthorized actions even if they visit malicious websites while authenticated to the food delivery system.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks typically require user interaction (visiting a malicious page) but are technically simple to implement once the vulnerable endpoints are identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-25-0469

Restart Required: No

Instructions:

1. Contact Restajet Information Technologies Inc. for patch availability. 2. If patch is available, apply according to vendor instructions. 3. Test the application after patching.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to all state-changing requests and validate them server-side

SameSite Cookie Attribute

all

Set SameSite=Strict or SameSite=Lax attributes on session cookies

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with CSRF protection rules
  • Require re-authentication for sensitive actions and implement additional confirmation steps

🔍 How to Verify

Check if Vulnerable:

Check if state-changing endpoints (POST, PUT, DELETE requests) lack CSRF token validation by inspecting network requests or testing with CSRF PoC tools

Check Version:

Check application version in admin panel or contact vendor for version identification method

Verify Fix Applied:

Verify that all state-changing requests now include and validate unique CSRF tokens, and that SameSite cookie attributes are properly set

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed state-changing requests from same user without CSRF tokens
  • Unusual pattern of requests from external referrers

Network Indicators:

  • Requests to sensitive endpoints with missing or invalid CSRF tokens
  • Requests with external referrers to state-changing endpoints

SIEM Query:

web_requests WHERE (method IN ('POST', 'PUT', 'DELETE')) AND (csrf_token IS NULL OR csrf_token INVALID) AND response_code = 200

🔗 References

📤 Share & Export