Description

A critical vulnerability has been identified in the Breeze Cache plugin for WordPress, actively exploited by attackers to upload arbitrary files without authentication. Tracked as CVE-2026-3844, the flaw carries a severe CVSS score of 9.8, indicating a high risk to affected systems. The plugin, developed by Cloudways, is widely used with over 400,000 active installations to optimize website performance through caching and database cleanup. Security researchers, including those from Defiant, have observed over 170 real-world exploitation attempts, confirming that attackers are actively targeting this vulnerability in the wild. The root cause of the issue lies in improper file validation within the plugin’s “fetch_gravatar_from_remote” function. This flaw allows unauthenticated attackers to upload malicious files to the server, potentially leading to remote code execution (RCE) and full website compromise. However, exploitation is conditional upon the “Host Files Locally - Gravatars” feature being enabled, which is not active by default. Once exploited, attackers can gain complete control over the affected website, execute arbitrary commands, and deploy further malicious payloads. The vulnerability affects all plugin versions up to 2.4.4, while version 2.4.5, recently released, includes a patch to address the issue. Given the active exploitation and widespread usage of the plugin, website administrators are strongly urged to take immediate action. Updating to the patched version (2.4.5) is the most effective mitigation strategy. If updating is not immediately feasible, disabling the vulnerable feature or the plugin entirely is recommended to reduce risk exposure. The incident highlights the ongoing threat posed by vulnerabilities in widely deployed web plugins, particularly those that allow unauthenticated access. Organizations relying on WordPress environments must prioritize timely patch management, continuous monitoring, and secure configuration practices to prevent compromise. This vulnerability serves as a reminder of how even optional features can introduce critical security risks when not properly secured or monitored.