


Perceptive Security
SOC/SIEM Consultancy

The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'fetch_gravatar_from_remote' function i…
Published:
22 April 2026 at 22:00:00
Alert date:
23 April 2026 at 15:02:55
Source:
nvd.nist.gov
Web Technologies
The Breeze Cache plugin for WordPress contains a critical arbitrary file upload vulnerability in versions up to 2.4.4. The vulnerability exists in the 'fetch_gravatar_from_remote' function due to missing file type validation. Unauthenticated attackers can exploit this to upload arbitrary files to the server, potentially enabling remote code execution. The vulnerability requires the 'Host Files Locally - Gravatars' feature to be enabled, which is disabled by default. This represents a high-severity security risk for WordPress sites using the affected plugin versions.
Technical details
Mitigation steps:
Affected products:
Breeze Cache WordPress Plugin
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-3844
https://plugins.trac.wordpress.org/browser/breeze/tags/2.4.1/inc/class-breeze-cache-cronjobs.php#L119
https://plugins.trac.wordpress.org/browser/breeze/tags/2.4.1/inc/class-breeze-cache-cronjobs.php#L89
https://plugins.trac.wordpress.org/changeset/3511463/breeze
https://www.wordfence.com/threat-intel/vulnerabilities/id/e342b1c0-6e7f-4e2c-8a52-018df12c12a0?source=cve
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
