VYPR
Medium severity5.4NVD Advisory· Published May 19, 2025· Updated Apr 23, 2026

CVE-2025-47583

CVE-2025-47583

Description

Cross-Site Request Forgery (CSRF) vulnerability in Dimitri Grassi Salon booking system salon-booking-system allows Cross Site Request Forgery.This issue affects Salon booking system: from n/a through <= 10.16.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CSRF vulnerability in WordPress Salon booking system plugin (≤10.16) allows attackers to force privileged users to delete arbitrary content.

Vulnerability

Overview

The Salon booking system plugin for WordPress (versions up to and including 10.16) contains a Cross-Site Request Forgery (CSRF) vulnerability. This flaw arises from missing or insufficient CSRF token validation on certain administrative actions, enabling an attacker to trick a logged-in administrator into unknowingly executing unwanted operations [1].

Exploitation

Prerequisites

To exploit this vulnerability, an attacker must craft a malicious link, form, or webpage that triggers a state-changing request. The victim must be a privileged user (e.g., administrator) currently authenticated to the WordPress site and must interact with the crafted content—for example, by clicking a link or submitting a form. No additional privileges are required on the attacker's part, and the attack can be delivered via email, social media, or other channels [1].

Impact

Successful exploitation allows the attacker to force the victim to perform arbitrary actions under their current session. In this specific case, the CSRF can be leveraged to delete arbitrary content (such as posts, pages, or bookings) from the WordPress site. This could lead to data loss, service disruption, or defacement, depending on the content deleted [1].

Mitigation

The vulnerability has been addressed in version 10.17 of the plugin. Users are strongly advised to update to this version or later immediately. Patchstack users can enable auto-updates for vulnerable plugins. No workaround is currently available, and given the potential for mass exploitation, prompt updating is critical [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.