CVE-2025-5814: CWE-862 Missing Authorization in switcorp Profiler – What Slowing Down Your WP
The Profiler – What Slowing Down Your WP plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpsd_plugin_control() function in all versions up to, and including, 1.0.0. This makes it possible for unauthenticated attackers to reactivate previously deactivated plugins after accessing the "Profiler" page.
AI Analysis
Technical Summary
CVE-2025-5814 is a security vulnerability identified in the WordPress plugin "Profiler – What Slowing Down Your WP" developed by switcorp. The vulnerability is classified under CWE-862, which corresponds to Missing Authorization. Specifically, the issue arises because the function wpsd_plugin_control() lacks proper capability checks, allowing unauthorized users to invoke it. This function controls plugin activation states, and due to the missing authorization, unauthenticated attackers can reactivate plugins that were previously deactivated. The vulnerability affects all versions up to and including 1.0.0 of the plugin. The CVSS v3.1 base score is 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit remotely. The impact is limited to integrity, as attackers can modify plugin activation states but cannot directly affect confidentiality or availability. There are no known exploits in the wild at the time of publication, and no patches have been released yet. This vulnerability could be leveraged by attackers to bypass administrative controls and potentially enable plugins that introduce further vulnerabilities or malicious code, thereby escalating the risk to the affected WordPress installations.
Potential Impact
For European organizations using WordPress websites with the vulnerable "Profiler – What Slowing Down Your WP" plugin, this vulnerability poses a moderate risk. Unauthorized reactivation of plugins can lead to unintended execution of code, especially if the reactivated plugins are outdated or have known vulnerabilities themselves. This could facilitate further compromise, data integrity issues, or unauthorized changes to website functionality. Since WordPress is widely used across Europe for business, governmental, and e-commerce sites, exploitation could undermine trust, disrupt services, or lead to data manipulation. The lack of authentication requirement increases the risk of automated attacks from remote adversaries. Organizations in sectors with strict data integrity requirements, such as finance, healthcare, and public administration, may face compliance and reputational risks if exploited. However, the absence of direct confidentiality or availability impact and the medium CVSS score suggest the threat is moderate but should not be ignored.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the "Profiler – What Slowing Down Your WP" plugin is installed and active. If present, they should consider disabling or removing the plugin until a security patch is released by switcorp. In the interim, restricting access to the WordPress admin dashboard and the "Profiler" page via IP whitelisting or web application firewall (WAF) rules can reduce exposure. Monitoring logs for unusual plugin activation events can help detect exploitation attempts. Organizations should also ensure that all plugins and WordPress core are kept up to date to minimize the risk of chained exploits. Implementing the principle of least privilege for WordPress user roles and enforcing strong authentication mechanisms will further reduce risk. Finally, subscribing to vulnerability advisories and promptly applying patches once available is critical.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-5814: CWE-862 Missing Authorization in switcorp Profiler – What Slowing Down Your WP
Description
The Profiler – What Slowing Down Your WP plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpsd_plugin_control() function in all versions up to, and including, 1.0.0. This makes it possible for unauthenticated attackers to reactivate previously deactivated plugins after accessing the "Profiler" page.
AI-Powered Analysis
Technical Analysis
CVE-2025-5814 is a security vulnerability identified in the WordPress plugin "Profiler – What Slowing Down Your WP" developed by switcorp. The vulnerability is classified under CWE-862, which corresponds to Missing Authorization. Specifically, the issue arises because the function wpsd_plugin_control() lacks proper capability checks, allowing unauthorized users to invoke it. This function controls plugin activation states, and due to the missing authorization, unauthenticated attackers can reactivate plugins that were previously deactivated. The vulnerability affects all versions up to and including 1.0.0 of the plugin. The CVSS v3.1 base score is 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit remotely. The impact is limited to integrity, as attackers can modify plugin activation states but cannot directly affect confidentiality or availability. There are no known exploits in the wild at the time of publication, and no patches have been released yet. This vulnerability could be leveraged by attackers to bypass administrative controls and potentially enable plugins that introduce further vulnerabilities or malicious code, thereby escalating the risk to the affected WordPress installations.
Potential Impact
For European organizations using WordPress websites with the vulnerable "Profiler – What Slowing Down Your WP" plugin, this vulnerability poses a moderate risk. Unauthorized reactivation of plugins can lead to unintended execution of code, especially if the reactivated plugins are outdated or have known vulnerabilities themselves. This could facilitate further compromise, data integrity issues, or unauthorized changes to website functionality. Since WordPress is widely used across Europe for business, governmental, and e-commerce sites, exploitation could undermine trust, disrupt services, or lead to data manipulation. The lack of authentication requirement increases the risk of automated attacks from remote adversaries. Organizations in sectors with strict data integrity requirements, such as finance, healthcare, and public administration, may face compliance and reputational risks if exploited. However, the absence of direct confidentiality or availability impact and the medium CVSS score suggest the threat is moderate but should not be ignored.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the "Profiler – What Slowing Down Your WP" plugin is installed and active. If present, they should consider disabling or removing the plugin until a security patch is released by switcorp. In the interim, restricting access to the WordPress admin dashboard and the "Profiler" page via IP whitelisting or web application firewall (WAF) rules can reduce exposure. Monitoring logs for unusual plugin activation events can help detect exploitation attempts. Organizations should also ensure that all plugins and WordPress core are kept up to date to minimize the risk of chained exploits. Implementing the principle of least privilege for WordPress user roles and enforcing strong authentication mechanisms will further reduce risk. Finally, subscribing to vulnerability advisories and promptly applying patches once available is critical.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-06T16:14:55.840Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6843c08b71f4d251b5f46162
Added to database: 6/7/2025, 4:31:07 AM
Last enriched: 7/8/2025, 12:25:42 PM
Last updated: 8/15/2025, 5:15:43 AM
Views: 20
Related Threats
CVE-2025-33100: CWE-798 Use of Hard-coded Credentials in IBM Concert Software
MediumCVE-2025-33090: CWE-1333 Inefficient Regular Expression Complexity in IBM Concert Software
HighCVE-2025-27909: CWE-942 Permissive Cross-domain Policy with Untrusted Domains in IBM Concert Software
MediumCVE-2025-1759: CWE-244 Improper Clearing of Heap Memory Before Release ('Heap Inspection') in IBM Concert Software
MediumCVE-2025-4962: CWE-284 Improper Access Control in lunary-ai lunary-ai/lunary
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.