Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62144: CWE-862 Missing Authorization in Mohammed Kaludi Core Web Vitals & PageSpeed Booster

0
Medium
VulnerabilityCVE-2025-62144cvecve-2025-62144cwe-862
Published: Wed Dec 31 2025 (12/31/2025, 13:48:57 UTC)
Source: CVE Database V5
Vendor/Project: Mohammed Kaludi
Product: Core Web Vitals & PageSpeed Booster

Description

Missing Authorization vulnerability in Mohammed Kaludi Core Web Vitals & PageSpeed Booster allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Core Web Vitals & PageSpeed Booster: from n/a through 1.0.27.

AI-Powered Analysis

AILast updated: 12/31/2025, 14:13:49 UTC

Technical Analysis

CVE-2025-62144 identifies a missing authorization vulnerability (CWE-862) in the Mohammed Kaludi Core Web Vitals & PageSpeed Booster plugin, versions up to 1.0.27. This vulnerability arises from incorrectly configured access control mechanisms, allowing users with limited privileges to bypass intended security restrictions. Specifically, the plugin fails to properly verify whether a user is authorized to perform certain actions or access specific resources, leading to unauthorized access or modification of data. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), requiring some privileges (PR:L) but no user interaction (UI:N). The impact affects confidentiality and integrity, but not availability. Although no exploits are currently known in the wild, the flaw poses a risk to websites relying on this plugin for performance optimization and web vitals monitoring. The absence of patch links suggests that a fix may not yet be publicly available, increasing the urgency for affected users to monitor vendor updates and apply patches promptly once released. The vulnerability was reserved in October 2025 and published at the end of 2025, indicating a recent discovery. Given the plugin’s role in web performance, exploitation could also indirectly affect user experience and trust if unauthorized changes occur.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to sensitive website data or unauthorized modification of performance settings, potentially degrading site reliability or exposing confidential information. Organizations relying on this plugin for SEO and user experience optimization may face reputational damage if attackers exploit the flaw to manipulate site metrics or content. The confidentiality impact could extend to customer data or internal analytics, while integrity impacts might allow attackers to alter site behavior or inject malicious content. Although availability is not directly affected, indirect impacts such as degraded performance or trust loss could harm business operations. The medium severity rating suggests a moderate risk, but the ease of remote exploitation and the widespread use of WordPress plugins in Europe elevate the threat. Organizations in sectors like e-commerce, media, and digital services are particularly at risk due to their reliance on web performance tools and the sensitivity of their data.

Mitigation Recommendations

Organizations should immediately audit their use of the Mohammed Kaludi Core Web Vitals & PageSpeed Booster plugin and restrict its access to trusted administrators only. Implement strict role-based access controls (RBAC) to ensure that users with limited privileges cannot perform unauthorized actions. Monitor logs for unusual access patterns or privilege escalations related to the plugin. Since no patch is currently available, consider temporarily disabling the plugin or replacing it with alternative tools until a vendor-provided fix is released. Engage with the vendor or community to track patch releases and apply updates promptly. Additionally, conduct regular security assessments of all WordPress plugins to identify and remediate similar authorization issues. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting this plugin’s endpoints. Finally, educate administrators on the risks of privilege misuse and enforce the principle of least privilege across all web management interfaces.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-07T15:41:47.138Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69552c1edb813ff03eeb80e9

Added to database: 12/31/2025, 1:58:54 PM

Last enriched: 12/31/2025, 2:13:49 PM

Last updated: 1/7/2026, 4:12:43 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats