CVE-2025-5814: CWE-862 Missing Authorization in switcorp Profiler – What Slowing Down Your WP
The Profiler – What Slowing Down Your WP plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpsd_plugin_control() function in all versions up to, and including, 1.0.0. This makes it possible for unauthenticated attackers to reactivate previously deactivated plugins after accessing the "Profiler" page.
AI Analysis
Technical Summary
CVE-2025-5814 is a security vulnerability identified in the WordPress plugin "Profiler – What Slowing Down Your WP" developed by switcorp. The vulnerability is classified under CWE-862, which corresponds to Missing Authorization. Specifically, the issue arises because the function wpsd_plugin_control() lacks proper capability checks, allowing unauthorized users to invoke it. This function controls plugin activation states, and due to the missing authorization, unauthenticated attackers can reactivate plugins that were previously deactivated. The vulnerability affects all versions up to and including 1.0.0 of the plugin. The CVSS v3.1 base score is 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit remotely. The impact is limited to integrity, as attackers can modify plugin activation states but cannot directly affect confidentiality or availability. There are no known exploits in the wild at the time of publication, and no patches have been released yet. This vulnerability could be leveraged by attackers to bypass administrative controls and potentially enable plugins that introduce further vulnerabilities or malicious code, thereby escalating the risk to the affected WordPress installations.
Potential Impact
For European organizations using WordPress websites with the vulnerable "Profiler – What Slowing Down Your WP" plugin, this vulnerability poses a moderate risk. Unauthorized reactivation of plugins can lead to unintended execution of code, especially if the reactivated plugins are outdated or have known vulnerabilities themselves. This could facilitate further compromise, data integrity issues, or unauthorized changes to website functionality. Since WordPress is widely used across Europe for business, governmental, and e-commerce sites, exploitation could undermine trust, disrupt services, or lead to data manipulation. The lack of authentication requirement increases the risk of automated attacks from remote adversaries. Organizations in sectors with strict data integrity requirements, such as finance, healthcare, and public administration, may face compliance and reputational risks if exploited. However, the absence of direct confidentiality or availability impact and the medium CVSS score suggest the threat is moderate but should not be ignored.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the "Profiler – What Slowing Down Your WP" plugin is installed and active. If present, they should consider disabling or removing the plugin until a security patch is released by switcorp. In the interim, restricting access to the WordPress admin dashboard and the "Profiler" page via IP whitelisting or web application firewall (WAF) rules can reduce exposure. Monitoring logs for unusual plugin activation events can help detect exploitation attempts. Organizations should also ensure that all plugins and WordPress core are kept up to date to minimize the risk of chained exploits. Implementing the principle of least privilege for WordPress user roles and enforcing strong authentication mechanisms will further reduce risk. Finally, subscribing to vulnerability advisories and promptly applying patches once available is critical.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-5814: CWE-862 Missing Authorization in switcorp Profiler – What Slowing Down Your WP
Description
The Profiler – What Slowing Down Your WP plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpsd_plugin_control() function in all versions up to, and including, 1.0.0. This makes it possible for unauthenticated attackers to reactivate previously deactivated plugins after accessing the "Profiler" page.
AI-Powered Analysis
Technical Analysis
CVE-2025-5814 is a security vulnerability identified in the WordPress plugin "Profiler – What Slowing Down Your WP" developed by switcorp. The vulnerability is classified under CWE-862, which corresponds to Missing Authorization. Specifically, the issue arises because the function wpsd_plugin_control() lacks proper capability checks, allowing unauthorized users to invoke it. This function controls plugin activation states, and due to the missing authorization, unauthenticated attackers can reactivate plugins that were previously deactivated. The vulnerability affects all versions up to and including 1.0.0 of the plugin. The CVSS v3.1 base score is 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit remotely. The impact is limited to integrity, as attackers can modify plugin activation states but cannot directly affect confidentiality or availability. There are no known exploits in the wild at the time of publication, and no patches have been released yet. This vulnerability could be leveraged by attackers to bypass administrative controls and potentially enable plugins that introduce further vulnerabilities or malicious code, thereby escalating the risk to the affected WordPress installations.
Potential Impact
For European organizations using WordPress websites with the vulnerable "Profiler – What Slowing Down Your WP" plugin, this vulnerability poses a moderate risk. Unauthorized reactivation of plugins can lead to unintended execution of code, especially if the reactivated plugins are outdated or have known vulnerabilities themselves. This could facilitate further compromise, data integrity issues, or unauthorized changes to website functionality. Since WordPress is widely used across Europe for business, governmental, and e-commerce sites, exploitation could undermine trust, disrupt services, or lead to data manipulation. The lack of authentication requirement increases the risk of automated attacks from remote adversaries. Organizations in sectors with strict data integrity requirements, such as finance, healthcare, and public administration, may face compliance and reputational risks if exploited. However, the absence of direct confidentiality or availability impact and the medium CVSS score suggest the threat is moderate but should not be ignored.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the "Profiler – What Slowing Down Your WP" plugin is installed and active. If present, they should consider disabling or removing the plugin until a security patch is released by switcorp. In the interim, restricting access to the WordPress admin dashboard and the "Profiler" page via IP whitelisting or web application firewall (WAF) rules can reduce exposure. Monitoring logs for unusual plugin activation events can help detect exploitation attempts. Organizations should also ensure that all plugins and WordPress core are kept up to date to minimize the risk of chained exploits. Implementing the principle of least privilege for WordPress user roles and enforcing strong authentication mechanisms will further reduce risk. Finally, subscribing to vulnerability advisories and promptly applying patches once available is critical.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-06T16:14:55.840Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6843c08b71f4d251b5f46162
Added to database: 6/7/2025, 4:31:07 AM
Last enriched: 7/8/2025, 12:25:42 PM
Last updated: 9/17/2025, 6:21:39 AM
Views: 29
Related Threats
CVE-2025-10499: CWE-352 Cross-Site Request Forgery (CSRF) in kstover Ninja Forms – The Contact Form Builder That Grows With You
MediumCVE-2025-10498: CWE-352 Cross-Site Request Forgery (CSRF) in kstover Ninja Forms – The Contact Form Builder That Grows With You
MediumCVE-2025-8440: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in spwebguy Team Members
MediumCVE-2025-36239: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-59945: CWE-266: Incorrect Privilege Assignment in Syslifters sysreptor
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.