top of page

Over 400,000 WordPress Sites Vulnerable to Breeze Cache Plugin Exploit (CVE-2026-3844)

  • 4 hours ago
  • 2 min read

Key Findings


  • Critical vulnerability (CVE-2026-3844, CVSS 9.8) in Breeze Cache WordPress plugin allows unauthenticated file uploads

  • Over 400,000 websites currently affected by the flaw

  • Wordfence detected 170+ active attacks, with 3,936 blocked in 24 hours alone

  • Vulnerability requires "Host Files Locally – Gravatars" option to be enabled, which is disabled by default

  • Affects all versions up to 2.4.4; patch available in version 2.4.5


Background


Breeze Cache is a popular free WordPress plugin developed by Cloudways designed to improve website speed and performance. The plugin handles page and browser caching, file minification, Gzip compression, and CDN integration to reduce load times. Its widespread adoption across over 400,000 websites makes this vulnerability a significant concern for the WordPress ecosystem.


Technical Vulnerability


The flaw exists in the 'fetch_gravatar_from_remote' function and stems from missing file-type validation. This oversight allows unauthenticated attackers to bypass security checks and upload arbitrary files to a server without requiring login credentials. Once files are uploaded, attackers can potentially achieve remote code execution and gain full control of affected websites.


Security researcher Hung Nguyen discovered the vulnerability. According to Wordfence's analysis, exploitation is only possible when the "Host Files Locally – Gravatars" feature is explicitly enabled, limiting the number of vulnerable installations despite the large user base.


Active Exploitation


Threat actors are actively exploiting this vulnerability in the wild. Wordfence's security team has documented over 170 attack attempts leveraging CVE-2026-3844. Attack activity has accelerated significantly, with the security firm blocking 3,936 individual attacks targeting this flaw within just a single 24-hour period.


Recommended Response


Website administrators using Breeze Cache should prioritize updating to version 2.4.5 immediately. Those unable to update quickly should consider temporarily disabling the plugin to prevent exploitation. Given the active attack campaigns and the ease of exploitation, prompt action is essential to protect affected websites from compromise.


Sources


  • https://securityaffairs.com/191267/uncategorized/over-400000-sites-at-risk-as-hackers-exploit-breeze-cache-plugin-flaw-cve-2026-3844.html

  • https://www.socdefenders.ai/item/19a488b8-7440-4de3-bb43-84891abbac29

  • https://x.com/shah_sheikh/status/2048054490490880304

  • https://x.com/securityaffairs/status/2048045147263287708

  • https://www.linkedin.com/posts/dlross_over-400000-sites-at-risk-as-hackers-exploit-activity-7453997535578480640-oXxG

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page