CVE-2025-62144: CWE-862 Missing Authorization in Mohammed Kaludi Core Web Vitals & PageSpeed Booster
Missing Authorization vulnerability in Mohammed Kaludi Core Web Vitals & PageSpeed Booster allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Core Web Vitals & PageSpeed Booster: from n/a through 1.0.27.
AI Analysis
Technical Summary
CVE-2025-62144 identifies a missing authorization vulnerability (CWE-862) in the Mohammed Kaludi Core Web Vitals & PageSpeed Booster plugin, which is used to optimize website performance metrics. The vulnerability arises from incorrectly configured access control security levels, allowing users with low privileges (PR:L) to perform actions that should be restricted. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) indicates that the vulnerability is remotely exploitable over the network without user interaction, requires low complexity, and some privileges but no user interaction. The impact affects confidentiality and integrity to a limited extent but does not affect availability. The plugin versions up to 1.0.27 are affected, although the exact range is not fully specified. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and assigned a CVE ID. This missing authorization flaw could allow an attacker to access or modify sensitive plugin settings or data, potentially undermining website performance configurations or exposing internal metrics. Since the plugin is commonly used in WordPress environments, exploitation could be a stepping stone for further attacks if combined with other vulnerabilities or misconfigurations.
Potential Impact
For European organizations, the vulnerability poses a risk of unauthorized access to web performance optimization settings, which could lead to exposure or manipulation of sensitive data related to website metrics and configurations. While the direct impact on confidentiality and integrity is limited, attackers could leverage this flaw to gain footholds or gather intelligence for more damaging attacks. Organizations relying heavily on WordPress and this specific plugin for SEO and performance improvements may face degraded trust or operational disruptions if attackers alter configurations. The absence of availability impact reduces the risk of service outages, but the integrity compromise could affect website behavior and user experience. Given the medium severity and the requirement for some privileges, the threat is more relevant to organizations with multiple user roles or delegated administration, common in larger enterprises and agencies. The lack of known exploits suggests a window for proactive mitigation before active attacks emerge.
Mitigation Recommendations
Organizations should immediately inventory their WordPress installations to identify the presence of the Mohammed Kaludi Core Web Vitals & PageSpeed Booster plugin and verify the version in use. Until an official patch is released, restrict plugin management capabilities strictly to trusted administrators and review user roles to minimize privilege exposure. Implement strict access control policies and audit logs to detect unauthorized attempts to access or modify plugin settings. Consider disabling or removing the plugin if it is not essential, or replace it with alternative tools that have a stronger security posture. Monitor security advisories from the vendor and Patchstack for updates or patches. Additionally, employ web application firewalls (WAFs) to detect and block suspicious requests targeting plugin endpoints. Regularly update WordPress core and all plugins to reduce the attack surface and maintain a secure environment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-62144: CWE-862 Missing Authorization in Mohammed Kaludi Core Web Vitals & PageSpeed Booster
Description
Missing Authorization vulnerability in Mohammed Kaludi Core Web Vitals & PageSpeed Booster allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Core Web Vitals & PageSpeed Booster: from n/a through 1.0.27.
AI-Powered Analysis
Technical Analysis
CVE-2025-62144 identifies a missing authorization vulnerability (CWE-862) in the Mohammed Kaludi Core Web Vitals & PageSpeed Booster plugin, which is used to optimize website performance metrics. The vulnerability arises from incorrectly configured access control security levels, allowing users with low privileges (PR:L) to perform actions that should be restricted. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) indicates that the vulnerability is remotely exploitable over the network without user interaction, requires low complexity, and some privileges but no user interaction. The impact affects confidentiality and integrity to a limited extent but does not affect availability. The plugin versions up to 1.0.27 are affected, although the exact range is not fully specified. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and assigned a CVE ID. This missing authorization flaw could allow an attacker to access or modify sensitive plugin settings or data, potentially undermining website performance configurations or exposing internal metrics. Since the plugin is commonly used in WordPress environments, exploitation could be a stepping stone for further attacks if combined with other vulnerabilities or misconfigurations.
Potential Impact
For European organizations, the vulnerability poses a risk of unauthorized access to web performance optimization settings, which could lead to exposure or manipulation of sensitive data related to website metrics and configurations. While the direct impact on confidentiality and integrity is limited, attackers could leverage this flaw to gain footholds or gather intelligence for more damaging attacks. Organizations relying heavily on WordPress and this specific plugin for SEO and performance improvements may face degraded trust or operational disruptions if attackers alter configurations. The absence of availability impact reduces the risk of service outages, but the integrity compromise could affect website behavior and user experience. Given the medium severity and the requirement for some privileges, the threat is more relevant to organizations with multiple user roles or delegated administration, common in larger enterprises and agencies. The lack of known exploits suggests a window for proactive mitigation before active attacks emerge.
Mitigation Recommendations
Organizations should immediately inventory their WordPress installations to identify the presence of the Mohammed Kaludi Core Web Vitals & PageSpeed Booster plugin and verify the version in use. Until an official patch is released, restrict plugin management capabilities strictly to trusted administrators and review user roles to minimize privilege exposure. Implement strict access control policies and audit logs to detect unauthorized attempts to access or modify plugin settings. Consider disabling or removing the plugin if it is not essential, or replace it with alternative tools that have a stronger security posture. Monitor security advisories from the vendor and Patchstack for updates or patches. Additionally, employ web application firewalls (WAFs) to detect and block suspicious requests targeting plugin endpoints. Regularly update WordPress core and all plugins to reduce the attack surface and maintain a secure environment.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-07T15:41:47.138Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69552c1edb813ff03eeb80e9
Added to database: 12/31/2025, 1:58:54 PM
Last enriched: 1/20/2026, 10:32:35 PM
Last updated: 2/7/2026, 6:55:36 AM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.