CVE-2026-22487
Unknown Unknown - Not Provided
Missing Authorization in baqend Speed Kit Allows Unauthorized Access

Publication date: 2026-01-08

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Missing Authorization vulnerability in baqend Speed Kit baqend allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Speed Kit: from n/a through <= 2.0.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-08
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2026-01-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
baqend speed_kit to 2.0.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-22487 is a broken access control vulnerability in the WordPress Speed Kit Plugin (versions up to 2.0.2). It occurs due to missing authorization, authentication, or nonce token checks in certain plugin functions. This flaw allows users with lower privileges (such as subscribers or developers) to perform actions that normally require higher privileges, potentially bypassing intended access restrictions. [1]


How can this vulnerability impact me? :

This vulnerability can allow unprivileged users to perform actions that should be restricted to higher-privileged users, potentially leading to unauthorized changes or operations within the WordPress environment. Although the severity is rated low (CVSS 4.3), it still poses a risk of privilege escalation and unauthorized access to certain plugin functions. [1]


What immediate steps should I take to mitigate this vulnerability?

Since there is no official fix or patched version available as of the publication date, immediate mitigation steps include monitoring and restricting user privileges to prevent unprivileged users (such as subscribers or developers) from performing actions that require higher privileges. Additionally, consider disabling or removing the Speed Kit Plugin version 2.0.2 or earlier until a patch is released. Utilizing security intelligence services like Patchstack's mitigation recommendations may also help reduce risk. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart