CVE-2026-4127
Missing Authorization in WordPress Speedup Plugin Enables Privilege Abuse
Publication date: 2026-03-21
Last updated on: 2026-04-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| speedup_optimization | plugin | to 1.5.9 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Speedup Optimization plugin for WordPress has a vulnerability called Missing Authorization in all versions up to and including 1.5.9. Specifically, the function speedup01_ajax_enabled(), which handles an AJAX action, does not check if the user has the proper permissions or verify a security nonce. This means that any authenticated user with Subscriber-level access or higher can send a POST request to enable or disable the site's optimization module without proper authorization.
How can this vulnerability impact me? :
This vulnerability allows authenticated users with low-level access (Subscriber or above) to enable or disable the site's optimization module without proper permission checks. This could lead to unauthorized changes in site performance or behavior, potentially disrupting the site's functionality or degrading user experience.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know