CVE-2025-54728
Description
Cross-Site Request Forgery (CSRF) vulnerability in CreativeMindsSolutions CM On Demand Search And Replace cm-on-demand-search-and-replace allows Cross Site Request Forgery.This issue affects CM On Demand Search And Replace: from n/a through <= 1.5.2.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cross-Site Request Forgery (CSRF) vulnerability in WordPress CM On Demand Search And Replace plugin versions up to 1.5.2 allows attackers to force privileged users to execute unwanted actions.
Vulnerability
Overview A Cross-Site Request Forgery (CSRF) vulnerability exists in the WordPress plugin CM On Demand Search And Replace, affecting versions from n/a through 1.5.2 [1]. The issue arises because the plugin fails to implement proper CSRF tokens or validation on sensitive operations, allowing an attacker to craft malicious requests that can be executed by an authenticated administrator without their knowledge.
Exploitation
Conditions Exploitation requires user interaction: an authenticated user must click a malicious link, visit a crafted page, or submit a form while logged into the WordPress admin [1]. The attacker does not need direct authentication but must trick a higher-privileged user into performing the action. No special network position is required; the attack can be delivered via email, social engineering, or cross-site scripting.
Impact
Successful exploitation could allow an attacker to force the victim to execute unintended actions under their current session, such as modifying search-and-replace operations, altering database entries, or changing plugin settings [1]. While the CVSS score is 4.3 (medium), the vulnerability could be chained with other attacks or leveraged in mass-exploit campaigns targeting multiple websites.
Mitigation
The vendor has released version 1.5.3, which addresses the CSRF vulnerability [1]. Users are strongly advised to update immediately. Patchstack users can enable auto-updates for vulnerable plugins. According to the advisory, the severity is considered low, and exploitation is unlikely, but updating is the recommended course of action [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=1.5.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.