CVE-2026-3844 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: April 23, 2026
Breeze Cache WordPress Plugin - Unrestricted File Upload
Published: April 23, 2026Updated: April 23, 2026Remote Exploitable
Overview
Breeze Cache WordPress plugin <= 2.4.4 contains an unrestricted file upload vulnerability caused by missing file type validation in 'fetch_gravatar_from_remote' function, letting unauthenticated attackers upload arbitrary files, exploit requires 'Host Files Locally - Gravatars' enabled.
Severity & Score
Severity: Critical
CVSS Score: 9.8
Impact
Unauthenticated attackers can upload arbitrary files, potentially leading to remote code execution and full server compromise.
Mitigation
Update to the latest version where this vulnerability is fixed.
References
- https://plugins.trac.wordpress.org/changeset/3511463/breeze
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e342b1c0-6e7f-4e2c-8a52-018df12c12a0?source=cve
- https://plugins.trac.wordpress.org/browser/breeze/tags/2.4.1/inc/class-breeze-cache-cronjobs.php#L119
- https://plugins.trac.wordpress.org/browser/breeze/tags/2.4.1/inc/class-breeze-cache-cronjobs.php#L89
Related Resources
Details
- CVE ID
- CVE-2026-3844
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- unrestricted_file_upload
- Status
- new
CWE
- CWE-434
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H