CVE-2026-3844
Breeze · Breeze Cache
The Breeze Cache plugin for WordPress is vulnerable to unauthenticated arbitrary file uploads via the Gravatar fetching function.
Executive summary
A critical file upload vulnerability in the Breeze Cache plugin allows unauthenticated attackers to achieve remote code execution.
Vulnerability
The fetch_gravatar_from_remote function lacks file type validation, allowing unauthenticated attackers to upload malicious files to the server.
Business impact
Successful exploitation allows for the execution of arbitrary code on the server, potentially leading to full site compromise, data theft, and defacement. Given the CVSS score of 9.8, this is a critical threat to the integrity and availability of the WordPress site.
Remediation
Immediate Action: Update the Breeze Cache plugin to the latest version.
Proactive Monitoring: Inspect the uploads directory for suspicious files, particularly executable scripts (e.g., .php files) that should not be present.
Compensating Controls: Disable the "Host Files Locally - Gravatars" feature if an immediate update is not possible, as this mitigates the attack vector.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Apply the update immediately. If the "Host Files Locally - Gravatars" feature is currently enabled, it should be disabled until the plugin is patched to prevent immediate exploitation.