CVE-2025-62144: CWE-862 Missing Authorization in Mohammed Kaludi Core Web Vitals & PageSpeed Booster
Missing Authorization vulnerability in Mohammed Kaludi Core Web Vitals & PageSpeed Booster allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Core Web Vitals & PageSpeed Booster: from n/a through 1.0.27.
AI Analysis
Technical Summary
CVE-2025-62144 identifies a missing authorization vulnerability (CWE-862) in the Mohammed Kaludi Core Web Vitals & PageSpeed Booster plugin, versions up to 1.0.27. This vulnerability arises from incorrectly configured access control mechanisms, allowing users with limited privileges to bypass intended security restrictions. Specifically, the plugin fails to properly verify whether a user is authorized to perform certain actions or access specific resources, leading to unauthorized access or modification of data. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), requiring some privileges (PR:L) but no user interaction (UI:N). The impact affects confidentiality and integrity, but not availability. Although no exploits are currently known in the wild, the flaw poses a risk to websites relying on this plugin for performance optimization and web vitals monitoring. The absence of patch links suggests that a fix may not yet be publicly available, increasing the urgency for affected users to monitor vendor updates and apply patches promptly once released. The vulnerability was reserved in October 2025 and published at the end of 2025, indicating a recent discovery. Given the plugin’s role in web performance, exploitation could also indirectly affect user experience and trust if unauthorized changes occur.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to sensitive website data or unauthorized modification of performance settings, potentially degrading site reliability or exposing confidential information. Organizations relying on this plugin for SEO and user experience optimization may face reputational damage if attackers exploit the flaw to manipulate site metrics or content. The confidentiality impact could extend to customer data or internal analytics, while integrity impacts might allow attackers to alter site behavior or inject malicious content. Although availability is not directly affected, indirect impacts such as degraded performance or trust loss could harm business operations. The medium severity rating suggests a moderate risk, but the ease of remote exploitation and the widespread use of WordPress plugins in Europe elevate the threat. Organizations in sectors like e-commerce, media, and digital services are particularly at risk due to their reliance on web performance tools and the sensitivity of their data.
Mitigation Recommendations
Organizations should immediately audit their use of the Mohammed Kaludi Core Web Vitals & PageSpeed Booster plugin and restrict its access to trusted administrators only. Implement strict role-based access controls (RBAC) to ensure that users with limited privileges cannot perform unauthorized actions. Monitor logs for unusual access patterns or privilege escalations related to the plugin. Since no patch is currently available, consider temporarily disabling the plugin or replacing it with alternative tools until a vendor-provided fix is released. Engage with the vendor or community to track patch releases and apply updates promptly. Additionally, conduct regular security assessments of all WordPress plugins to identify and remediate similar authorization issues. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting this plugin’s endpoints. Finally, educate administrators on the risks of privilege misuse and enforce the principle of least privilege across all web management interfaces.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-62144: CWE-862 Missing Authorization in Mohammed Kaludi Core Web Vitals & PageSpeed Booster
Description
Missing Authorization vulnerability in Mohammed Kaludi Core Web Vitals & PageSpeed Booster allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Core Web Vitals & PageSpeed Booster: from n/a through 1.0.27.
AI-Powered Analysis
Technical Analysis
CVE-2025-62144 identifies a missing authorization vulnerability (CWE-862) in the Mohammed Kaludi Core Web Vitals & PageSpeed Booster plugin, versions up to 1.0.27. This vulnerability arises from incorrectly configured access control mechanisms, allowing users with limited privileges to bypass intended security restrictions. Specifically, the plugin fails to properly verify whether a user is authorized to perform certain actions or access specific resources, leading to unauthorized access or modification of data. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), requiring some privileges (PR:L) but no user interaction (UI:N). The impact affects confidentiality and integrity, but not availability. Although no exploits are currently known in the wild, the flaw poses a risk to websites relying on this plugin for performance optimization and web vitals monitoring. The absence of patch links suggests that a fix may not yet be publicly available, increasing the urgency for affected users to monitor vendor updates and apply patches promptly once released. The vulnerability was reserved in October 2025 and published at the end of 2025, indicating a recent discovery. Given the plugin’s role in web performance, exploitation could also indirectly affect user experience and trust if unauthorized changes occur.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to sensitive website data or unauthorized modification of performance settings, potentially degrading site reliability or exposing confidential information. Organizations relying on this plugin for SEO and user experience optimization may face reputational damage if attackers exploit the flaw to manipulate site metrics or content. The confidentiality impact could extend to customer data or internal analytics, while integrity impacts might allow attackers to alter site behavior or inject malicious content. Although availability is not directly affected, indirect impacts such as degraded performance or trust loss could harm business operations. The medium severity rating suggests a moderate risk, but the ease of remote exploitation and the widespread use of WordPress plugins in Europe elevate the threat. Organizations in sectors like e-commerce, media, and digital services are particularly at risk due to their reliance on web performance tools and the sensitivity of their data.
Mitigation Recommendations
Organizations should immediately audit their use of the Mohammed Kaludi Core Web Vitals & PageSpeed Booster plugin and restrict its access to trusted administrators only. Implement strict role-based access controls (RBAC) to ensure that users with limited privileges cannot perform unauthorized actions. Monitor logs for unusual access patterns or privilege escalations related to the plugin. Since no patch is currently available, consider temporarily disabling the plugin or replacing it with alternative tools until a vendor-provided fix is released. Engage with the vendor or community to track patch releases and apply updates promptly. Additionally, conduct regular security assessments of all WordPress plugins to identify and remediate similar authorization issues. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting this plugin’s endpoints. Finally, educate administrators on the risks of privilege misuse and enforce the principle of least privilege across all web management interfaces.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-07T15:41:47.138Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69552c1edb813ff03eeb80e9
Added to database: 12/31/2025, 1:58:54 PM
Last enriched: 12/31/2025, 2:13:49 PM
Last updated: 1/7/2026, 4:12:43 AM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.