VYPR
Medium severity4.3NVD Advisory· Published Aug 14, 2025· Updated Apr 23, 2026

CVE-2025-54728

CVE-2025-54728

Description

Cross-Site Request Forgery (CSRF) vulnerability in CreativeMindsSolutions CM On Demand Search And Replace cm-on-demand-search-and-replace allows Cross Site Request Forgery.This issue affects CM On Demand Search And Replace: from n/a through <= 1.5.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Cross-Site Request Forgery (CSRF) vulnerability in WordPress CM On Demand Search And Replace plugin versions up to 1.5.2 allows attackers to force privileged users to execute unwanted actions.

Vulnerability

Overview A Cross-Site Request Forgery (CSRF) vulnerability exists in the WordPress plugin CM On Demand Search And Replace, affecting versions from n/a through 1.5.2 [1]. The issue arises because the plugin fails to implement proper CSRF tokens or validation on sensitive operations, allowing an attacker to craft malicious requests that can be executed by an authenticated administrator without their knowledge.

Exploitation

Conditions Exploitation requires user interaction: an authenticated user must click a malicious link, visit a crafted page, or submit a form while logged into the WordPress admin [1]. The attacker does not need direct authentication but must trick a higher-privileged user into performing the action. No special network position is required; the attack can be delivered via email, social engineering, or cross-site scripting.

Impact

Successful exploitation could allow an attacker to force the victim to execute unintended actions under their current session, such as modifying search-and-replace operations, altering database entries, or changing plugin settings [1]. While the CVSS score is 4.3 (medium), the vulnerability could be chained with other attacks or leveraged in mass-exploit campaigns targeting multiple websites.

Mitigation

The vendor has released version 1.5.3, which addresses the CSRF vulnerability [1]. Users are strongly advised to update immediately. Patchstack users can enable auto-updates for vulnerable plugins. According to the advisory, the severity is considered low, and exploitation is unlikely, but updating is the recommended course of action [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.