Five Star Restaurant Reservations – WordPress Booking Plugin Vulner…

Five Star Restaurant Reservations – WordPress Booking Plugin Vulner…

by | Feb 10, 2026 | Plugins

Attack Vectors

CVE-2025-68601 affects the Five Star Restaurant Reservations – WordPress Booking Plugin (slug: restaurant-reservations) in versions up to and including 2.7.8, and is rated Medium severity (CVSS 4.3). The issue is a Cross-Site Request Forgery (CSRF) weakness that relies on an administrator (or similarly privileged user) being tricked into clicking a link or interacting with a web page while logged into WordPress.

In practical terms, an attacker does not need a username or password to your site to attempt this. Instead, they attempt to “borrow” the administrator’s existing logged-in session by sending a forged request that the site processes as if it were intentionally submitted by the admin.

Similar Attacks: CSRF-style campaigns and “click-to-trigger” admin actions are a common tactic in web attacks. For reference, the broader CSRF technique is documented by OWASP: https://owasp.org/www-community/attacks/csrf. Real-world web campaign patterns also frequently rely on getting victims to click a crafted link or visit a malicious page, including drive-by/social engineering approaches such as the CISA alert on APT activity targeting organizations and large-scale web redirection/malvertising activity such as cryptojacking campaigns that attempt to monetize web visits.

Security Weakness

The reported root cause is missing or incorrect nonce validation on a function in Five Star Restaurant Reservations <= 2.7.8. In WordPress terms, a “nonce” is a standard safety check designed to confirm that a sensitive request was intentionally initiated by an authorized user inside the admin interface—not triggered indirectly by a third-party website.

When nonce validation is missing or implemented incorrectly, the site may accept forged requests. As noted in the vendor intelligence, an unauthenticated attacker can potentially perform an unauthorized action if they can convince a site administrator to take an action such as clicking a link.

The public record also notes that CVE-2026-0658 might be a duplicate of this issue. Treat that as a tracking note rather than a separate confirmed problem until your team verifies how your risk tools are reporting it.

Technical or Business Impacts

Although this vulnerability is rated Medium severity and does not indicate direct data theft (confidentiality impact is listed as none), it can still create real business risk. CSRF issues are often about unauthorized changes: settings adjustments, workflow disruption, or administrative actions performed without explicit approval.

For marketing directors and business owners, the key concern is loss of control over customer-facing operations. A booking and reservations plugin sits close to revenue-generating workflows: tampered settings or unintended actions can lead to missed reservations, damaged guest experience, brand harm, and preventable operational noise for staff.

From a governance and compliance perspective, unauthorized administrative actions—even without confirmed data exposure—can trigger incident response processes, audit questions, and internal controls reviews. The remediation is straightforward: update Five Star Restaurant Reservations to version 2.7.9 or a newer patched release. Track the CVE record here: https://www.cve.org/CVERecord?id=CVE-2025-68601 and the vendor advisory intelligence here: https://www.wordfence.com/threat-intel/vulnerabilities/id/92a35989-2b71-4eca-aae0-c8ea0d60ce40.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers