CVE-2025-48339: CWE-862 Missing Authorization in activity-log.com Profiler - What Slowing Down Your WP
Missing Authorization vulnerability in activity-log.com Profiler - What Slowing Down Your WP allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Profiler - What Slowing Down Your WP: from n/a through 1.0.0.
AI Analysis
Technical Summary
CVE-2025-48339 is a Missing Authorization vulnerability (CWE-862) identified in the WordPress plugin "Profiler - What Slowing Down Your WP" developed by activity-log.com. This vulnerability arises due to incorrectly configured access control security levels, allowing unauthorized users to access functionality or data that should be restricted. The affected versions include all versions up to 1.0.0, with no specific version exclusions noted. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) reveals that the vulnerability is remotely exploitable over the network without requiring any privileges or user interaction. The impact affects confidentiality and integrity but does not affect availability. Since the vulnerability is related to missing authorization, an attacker can potentially access sensitive profiling data or manipulate performance-related information that the plugin collects or displays, which could lead to information disclosure or unauthorized changes in the plugin’s behavior. No known exploits are reported in the wild as of the publication date (July 16, 2025), and no patches have been released yet. The vulnerability is particularly relevant to WordPress sites using this plugin for performance profiling and diagnostics.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites and web applications running WordPress with the "Profiler - What Slowing Down Your WP" plugin installed. Unauthorized access to profiling data could expose sensitive operational metrics or user behavior analytics, potentially leaking confidential information. Integrity impacts could allow attackers to manipulate performance data, misleading administrators and complicating incident response or performance tuning efforts. While availability is not directly impacted, the loss of trust in the accuracy of profiling data could degrade operational effectiveness. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) may face compliance risks if sensitive data is exposed. Additionally, attackers could leverage this vulnerability as a foothold for further attacks on the web infrastructure. Given the plugin’s use in performance diagnostics, organizations relying on it for critical monitoring might experience degraded security posture if the vulnerability is exploited.
Mitigation Recommendations
Immediate mitigation steps include auditing all WordPress installations to identify the presence of the "Profiler - What Slowing Down Your WP" plugin. Until an official patch is released, organizations should consider disabling or uninstalling the plugin to eliminate the attack surface. If disabling is not feasible, restrict access to the plugin’s functionality by implementing web application firewall (WAF) rules that limit access to trusted IP addresses or authenticated users only. Monitoring web server logs for unusual access patterns targeting the plugin’s endpoints is recommended. Additionally, organizations should review and tighten WordPress user roles and permissions to minimize exposure. Once a patch becomes available, prioritize its deployment after testing in staging environments. Finally, maintain regular backups and ensure incident response plans include scenarios involving unauthorized access to profiling or diagnostic data.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-48339: CWE-862 Missing Authorization in activity-log.com Profiler - What Slowing Down Your WP
Description
Missing Authorization vulnerability in activity-log.com Profiler - What Slowing Down Your WP allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Profiler - What Slowing Down Your WP: from n/a through 1.0.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-48339 is a Missing Authorization vulnerability (CWE-862) identified in the WordPress plugin "Profiler - What Slowing Down Your WP" developed by activity-log.com. This vulnerability arises due to incorrectly configured access control security levels, allowing unauthorized users to access functionality or data that should be restricted. The affected versions include all versions up to 1.0.0, with no specific version exclusions noted. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) reveals that the vulnerability is remotely exploitable over the network without requiring any privileges or user interaction. The impact affects confidentiality and integrity but does not affect availability. Since the vulnerability is related to missing authorization, an attacker can potentially access sensitive profiling data or manipulate performance-related information that the plugin collects or displays, which could lead to information disclosure or unauthorized changes in the plugin’s behavior. No known exploits are reported in the wild as of the publication date (July 16, 2025), and no patches have been released yet. The vulnerability is particularly relevant to WordPress sites using this plugin for performance profiling and diagnostics.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites and web applications running WordPress with the "Profiler - What Slowing Down Your WP" plugin installed. Unauthorized access to profiling data could expose sensitive operational metrics or user behavior analytics, potentially leaking confidential information. Integrity impacts could allow attackers to manipulate performance data, misleading administrators and complicating incident response or performance tuning efforts. While availability is not directly impacted, the loss of trust in the accuracy of profiling data could degrade operational effectiveness. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) may face compliance risks if sensitive data is exposed. Additionally, attackers could leverage this vulnerability as a foothold for further attacks on the web infrastructure. Given the plugin’s use in performance diagnostics, organizations relying on it for critical monitoring might experience degraded security posture if the vulnerability is exploited.
Mitigation Recommendations
Immediate mitigation steps include auditing all WordPress installations to identify the presence of the "Profiler - What Slowing Down Your WP" plugin. Until an official patch is released, organizations should consider disabling or uninstalling the plugin to eliminate the attack surface. If disabling is not feasible, restrict access to the plugin’s functionality by implementing web application firewall (WAF) rules that limit access to trusted IP addresses or authenticated users only. Monitoring web server logs for unusual access patterns targeting the plugin’s endpoints is recommended. Additionally, organizations should review and tighten WordPress user roles and permissions to minimize exposure. Once a patch becomes available, prioritize its deployment after testing in staging environments. Finally, maintain regular backups and ensure incident response plans include scenarios involving unauthorized access to profiling or diagnostic data.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-19T14:14:34.469Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68779109a83201eaacda589f
Added to database: 7/16/2025, 11:46:17 AM
Last enriched: 7/16/2025, 12:05:27 PM
Last updated: 1/7/2026, 5:23:56 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.