top of page
perceptive_background_267k.jpg

The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'fetch_gravatar_from_remote' function i…

Published:

22 april 2026 om 22:00:00

Alert date:

23 april 2026 om 04:01:00

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies

The Breeze Cache plugin for WordPress contains an arbitrary file upload vulnerability in versions up to 2.4.4 due to missing file type validation in the 'fetch_gravatar_from_remote' function. Unauthenticated attackers can exploit this to upload arbitrary files and potentially achieve remote code execution. The vulnerability requires the 'Host Files Locally - Gravatars' feature to be enabled, which is disabled by default. This affects the server security of WordPress sites using the vulnerable plugin versions.

Technical details

Mitigation steps:

Affected products:

Breeze Cache WordPress Plugin

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page