Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48099: Cross-Site Request Forgery (CSRF) in Code Amp Search & Filter

0
Medium
VulnerabilityCVE-2025-48099cvecve-2025-48099
Published: Wed Oct 22 2025 (10/22/2025, 14:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Code Amp
Product: Search & Filter

Description

Cross-Site Request Forgery (CSRF) vulnerability in Code Amp Search & Filter search-filter allows Cross Site Request Forgery.This issue affects Search & Filter: from n/a through <= 1.2.17.

AI-Powered Analysis

AILast updated: 01/20/2026, 19:54:11 UTC

Technical Analysis

CVE-2025-48099 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Code Amp Search & Filter plugin, affecting all versions up to and including 1.2.17. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application without their consent, leveraging the user's active session. In this case, the vulnerability allows attackers to perform actions on behalf of the user by exploiting the lack of proper anti-CSRF protections in the Search & Filter plugin. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N) indicates that the attack can be launched remotely over the network with low attack complexity, requires no privileges, but does require user interaction (such as clicking a malicious link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component, and the impact is limited to a low confidentiality loss, with no impact on integrity or availability. While no known exploits have been reported in the wild, the vulnerability poses a risk to websites using this plugin, especially those with authenticated users who have elevated privileges or access to sensitive data. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized actions being performed on their websites or web applications that use the Code Amp Search & Filter plugin. Although the impact is limited to confidentiality loss, attackers could potentially extract or manipulate sensitive search parameters or user-specific data accessible through the plugin. This could lead to privacy breaches or information disclosure, which is particularly sensitive under the GDPR framework. The vulnerability does not directly affect system integrity or availability, but the exploitation could undermine user trust and damage organizational reputation. Organizations in sectors such as e-commerce, media, and public services that rely on WordPress plugins for search functionality are at higher risk. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in targeted phishing or social engineering campaigns. The absence of known exploits in the wild reduces immediate threat but does not preclude future attacks once exploit code becomes available.

Mitigation Recommendations

European organizations should immediately verify if they are using the Code Amp Search & Filter plugin version 1.2.17 or earlier. If so, they should monitor vendor communications for patches and apply updates as soon as they become available. In the absence of a patch, implementing web application firewall (WAF) rules to detect and block suspicious CSRF attempts can reduce risk. Additionally, organizations should enforce strict user session management and limit user privileges to the minimum necessary, reducing the impact of potential CSRF attacks. Incorporating anti-CSRF tokens in custom implementations or ensuring that existing tokens are properly validated can mitigate exploitation. User education to recognize phishing attempts and avoid clicking suspicious links is also critical. Regular security audits and penetration testing focused on CSRF vulnerabilities can help identify and remediate weaknesses. Finally, monitoring logs for unusual user activity related to the plugin can provide early detection of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T17:54:35.011Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8efe904677bbd79439782

Added to database: 10/22/2025, 2:53:29 PM

Last enriched: 1/20/2026, 7:54:11 PM

Last updated: 2/6/2026, 3:21:29 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats