


Perceptive Security
SOC/SIEM Consultancy

The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'fetch_gravatar_from_remote' function i…
Published:
22 april 2026 om 22:00:00
Alert date:
23 april 2026 om 04:01:00
Source:
nvd.nist.gov
Web Technologies
The Breeze Cache plugin for WordPress contains an arbitrary file upload vulnerability in versions up to 2.4.4 due to missing file type validation in the 'fetch_gravatar_from_remote' function. Unauthenticated attackers can exploit this to upload arbitrary files and potentially achieve remote code execution. The vulnerability requires the 'Host Files Locally - Gravatars' feature to be enabled, which is disabled by default. This affects the server security of WordPress sites using the vulnerable plugin versions.
Technical details
Mitigation steps:
Affected products:
Breeze Cache WordPress Plugin
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-3844
https://plugins.trac.wordpress.org/browser/breeze/tags/2.4.1/inc/class-breeze-cache-cronjobs.php#L119
https://plugins.trac.wordpress.org/browser/breeze/tags/2.4.1/inc/class-breeze-cache-cronjobs.php#L89
https://plugins.trac.wordpress.org/changeset/3511463/breeze
https://www.wordfence.com/threat-intel/vulnerabilities/id/e342b1c0-6e7f-4e2c-8a52-018df12c12a0?source=cve
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
