First published: Mon Mar 24 2025(Updated: )
Cross-Site Request Forgery (CSRF) vulnerability in mandegarweb Replace Default Words allows Stored XSS. This issue affects Replace Default Words: from n/a through 1.3.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Replace Default Words | <=1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-30612 is considered high due to its potential for exploitation through Cross-Site Request Forgery leading to Stored XSS.
To fix CVE-2025-30612, update the Replace Default Words plugin to the latest version beyond 1.3 or apply any available security patches.
CVE-2025-30612 affects the Replace Default Words plugin versions from n/a through 1.3 in WordPress.
CVE-2025-30612 is a Cross-Site Request Forgery (CSRF) vulnerability that can lead to Stored XSS.
CVE-2025-30612 was reported by security researchers monitoring vulnerabilities in WordPress plugins.