Description
Cross-Site Request Forgery (CSRF) vulnerability in Andrea Landonio CloudSearch cloud-search allows Stored XSS.This issue affects CloudSearch: from n/a through <= 3.0.0.
Published: 2025-10-27
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Cross‑Site Request Forgery in the WordPress CloudSearch plugin can be exploited to store malicious JavaScript that is later executed in the context of legitimate site visitors, leading to potential hijacking of sessions, theft of credentials, or defacement of the web application. The vulnerability arises because the plugin accepts forged state‑changing requests without proper CSRF protection, enabling an attacker to inject payloads that the site will render and persist. The weakness is classified as CWE‑352.

Affected Systems

All installations of the Andrea Landonio CloudSearch WordPress plugin up to and including version 3.0.0 are affected; this includes any site running the plugin at versions n/a through 3.0.0. Users of newer releases are not impacted.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity potential. The EPSS score of less than 1% suggests a low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Likely attack vectors require an attacker to position a forged request – for example, by hosting a malicious page that submits a form or AJAX call to the vulnerable plugin endpoint – in order to persist the XSS payload in the site. Successful exploitation would give the attacker stored code that runs in the browsers of all authenticated and unauthenticated site visitors, enabling a range of downstream attacks.

Generated by OpenCVE AI on April 29, 2026 at 20:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WordPress CloudSearch plugin to the latest version that removes the CSRF vulnerability
  • If an upgrade cannot be performed immediately, deactivate the CloudSearch plugin to eliminate the attack surface
  • Implement a strict Content Security Policy to block execution of unsolicited scripts in the site
  • Verify that the plugin validates nonce tokens on all state‑changing requests, adding them if absent

Generated by OpenCVE AI on April 29, 2026 at 20:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Mon, 27 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Oct 2025 02:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Andrea Landonio CloudSearch cloud-search allows Stored XSS.This issue affects CloudSearch: from n/a through <= 3.0.0.
Title WordPress CloudSearch plugin <= 3.0.0 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:07.027Z

Reserved: 2025-10-24T14:25:01.199Z

Link: CVE-2025-62962

cve-icon Vulnrichment

Updated: 2025-10-27T15:09:17.683Z

cve-icon NVD

Status : Deferred

Published: 2025-10-27T02:15:56.430

Modified: 2026-04-27T17:16:38.123

Link: CVE-2025-62962

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T20:45:19Z

Weaknesses