CVE-2026-22487
Missing Authorization in baqend Speed Kit Allows Unauthorized Access
Publication date: 2026-01-08
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| baqend | speed_kit | to 2.0.2 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-22487 is a broken access control vulnerability in the WordPress Speed Kit Plugin (versions up to 2.0.2). It occurs due to missing authorization, authentication, or nonce token checks in certain plugin functions. This flaw allows users with lower privileges (such as subscribers or developers) to perform actions that normally require higher privileges, potentially bypassing intended access restrictions. [1]
How can this vulnerability impact me? :
This vulnerability can allow unprivileged users to perform actions that should be restricted to higher-privileged users, potentially leading to unauthorized changes or operations within the WordPress environment. Although the severity is rated low (CVSS 4.3), it still poses a risk of privilege escalation and unauthorized access to certain plugin functions. [1]
What immediate steps should I take to mitigate this vulnerability?
Since there is no official fix or patched version available as of the publication date, immediate mitigation steps include monitoring and restricting user privileges to prevent unprivileged users (such as subscribers or developers) from performing actions that require higher privileges. Additionally, consider disabling or removing the Speed Kit Plugin version 2.0.2 or earlier until a patch is released. Utilizing security intelligence services like Patchstack's mitigation recommendations may also help reduce risk. [1]