[CIVN-2026-0206] Arbitrary File Upload Vulnerability in Breeze Cache plugin for WordPress

By Published On: April 29, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Arbitrary File Upload Vulnerability in Breeze Cache plugin for WordPress


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: CRITICAL


Software Affected


Breeze Cache plugin for WordPress versions prior to 2.4.5

Overview


A critical vulnerability has been identified in the Breeze Cache plugin for WordPress which could allow an unauthenticated attacker to execute arbitrary code on the targeted system.


Target Audience:

Website administrators, developers, and organizations operating WordPress sites that use the Breeze Cache plugin.


Risk Assessment:

High risk of remote code execution.


Impact Assessment:

Potential for system compromise, data theft, unauthorized access.


Description


Breeze Cache is a WordPress caching plugin developed by Cloudways that improves website performance through page caching, file optimization, and CDN integration.


A vulnerability exists in the Breeze Cache plugin for WordPress due to improper validation of user-supplied input in the fetch_gravatar_from_remote functionality. This flaw allows unauthenticated users to upload arbitrary files to the server by abusing the gravatar-fetching mechanism.


Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary code on the targeted system.


Solution


Apply appropriate security updates as mentioned

https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/breeze/breeze-cache-244-unauthenticated-arbitrary-file- upload-via-fetch-gravatar-from-remote


Vendor Information


https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/breeze/breeze-cache-244-unauthenticated-arbitrary-file- upload-via-fetch-gravatar-from-remote


References

https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/breeze/breeze-cache-244-unauthenticated-arbitrary-file- upload-via-fetch-gravatar-from-remote


CVE Name


CVE-2026-3844




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnyGjwACgkQ3jCgcSdc

ys+7Kw//a1i/cChhbvQYDgsr+hL51iKKB9024MLvChmuFt3BGIvZMj82nRFnnXEe

Wk7KT1MIye4ZThiCQC8OR52KyU9URMmHmmB6W3TGlgGh4dksCWwcgNL/K3StAg9w

W2tmkub3i9tj9Ay5ZuA832Ts2i0kdlz0q3REml0+nSRma7eaatCKQUGByEosprpQ

Z6vWNsiMKiMGg7DJt6rNFRJqIt/kwXPmJ7gAQC0r5L5NE3paEUq5OyFGA9RMIUxh

6K1J0uSRQMOrppgkusYdTiJ5vDgaNpSc8xVAm6aIYxzw6hMHjKA2eiLPoNbrh+zr

XGhstj5hyOSTDnWpGY6eRDseR+Ex2fBdpEofpQ1CdkMsq1757zwRxLZWbNgiNUH8

SvUYVKyG6kJN1rQSuY/oCNMwD8OTYEKSXV091kavzHR/0FEwzcgCG7Q1wEKV29/3

07Ut8ECRoTfJehnriYfiAmsSE8bDVMrv6JNJ3B9ahhfPDvPddqSDRKdGA6on0BLW

10+2tDWJ3eiKU+n96+zSbCFyvzi87ugv+Hcojnh/p1ssdevVOkp4VK88h+JY65cz

LEDYIv7mBRvNdbcQVlLV87SgYZUqN3LAEyFcMGkcQ8U1vYNlmXg64HfX11rKSl1A

kXAGXexg3SGGzZ0c2+56sT9JpsZfeA5JgDwqE7AEvT9yaVpIEPA=

=REPW

—–END PGP SIGNATURE—–

Share this article