VYPR
Medium severity5.4NVD Advisory· Published Dec 31, 2025· Updated Apr 23, 2026

CVE-2025-62144

CVE-2025-62144

Description

Missing Authorization vulnerability in Mohammed Kaludi Core Web Vitals & PageSpeed Booster core-web-vitals-pagespeed-booster allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Core Web Vitals & PageSpeed Booster: from n/a through <= 1.0.28.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in Core Web Vitals & PageSpeed Booster plugin (≤1.0.28) allows unauthenticated privilege escalation.

Vulnerability

Overview

The Core Web Vitals & PageSpeed Booster WordPress plugin, versions up to and including 1.0.28, contains a missing authorization vulnerability. This flaw stems from incorrectly configured access control security levels, allowing exploitation of broken access control mechanisms [1]. The vulnerability is classified as a broken access control, meaning a function lacks proper authorization or nonce checks, enabling unprivileged users to execute higher-privileged actions [1].

Exploitation

Attackers can exploit this vulnerability without authentication, targeting thousands of websites in mass-exploit campaigns [1]. The attack surface is broad because the plugin is widely used for performance optimization. No special network position or user interaction is required beyond sending crafted requests to the vulnerable endpoint.

Impact

Successful exploitation allows an attacker to perform actions normally restricted to higher-privileged users, such as modifying plugin settings or accessing sensitive configuration data. This can lead to website defacement, data exposure, or further compromise of the WordPress installation.

Mitigation

The vendor has not released a patched version as of the publication date. Users are advised to update the plugin immediately if a fix becomes available, or contact their hosting provider for assistance [1]. The vulnerability is listed as medium severity (CVSS 5.4) and is actively used in mass-exploit campaigns, making prompt action critical.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.