CVE-2025-68601

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in the Five Star Restaurant Reservations WordPress plugin allows attackers to trick authenticated administrators into performing unauthorized actions. Attackers can create malicious requests that execute when an admin visits a compromised page, potentially modifying reservation settings or plugin configurations. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Five Star Restaurant Reservations WordPress Plugin
Versions: n/a through <= 2.7.7
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Attack requires administrator to be tricked into visiting malicious page while authenticated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify reservation settings, delete reservations, change plugin configurations, or potentially chain with other vulnerabilities for further compromise.

🟠

Likely Case

Attackers trick administrators into changing reservation settings or plugin configurations, disrupting restaurant operations.

🟢

If Mitigated

With proper CSRF tokens and same-origin policies, the vulnerability would be blocked, preventing unauthorized actions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to weaponize. Requires social engineering to trick authenticated users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >2.7.7

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/restaurant-reservations/vulnerability/wordpress-five-star-restaurant-reservations-plugin-2-7-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Five Star Restaurant Reservations'. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Implement CSRF Protection Middleware

all

Add custom WordPress filter to validate nonce tokens for plugin requests

Add to theme's functions.php or custom plugin: add_filter('check_admin_referer', 'custom_csrf_check', 10, 2); function custom_csrf_check($action, $result) { if (strpos($action, 'restaurant_reservations') !== false) { return wp_verify_nonce($_REQUEST['_wpnonce'], $action); } return $result; }

🧯 If You Can't Patch

  • Restrict plugin access to trusted administrators only and implement strict access controls
  • Use web application firewall (WAF) rules to block suspicious POST requests to plugin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Five Star Restaurant Reservations → Version. If version is 2.7.7 or lower, you are vulnerable.

Check Version:

wp plugin list --name='Five Star Restaurant Reservations' --field=version (if WP-CLI installed)

Verify Fix Applied:

After update, verify version is >2.7.7. Test admin functions while monitoring network requests for proper nonce tokens.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /wp-admin/admin-ajax.php or plugin endpoints without proper referrer headers
  • Administrative actions from unexpected IP addresses or user agents

Network Indicators:

  • POST requests to restaurant reservation endpoints without CSRF tokens
  • Requests with suspicious referrer domains

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "restaurant-reservations") AND http_method="POST" AND NOT (referrer CONTAINS "yourdomain.com" OR params CONTAINS "_wpnonce")

🔗 References

📤 Share & Export