{"id":2511,"date":"2026-04-29T08:48:41","date_gmt":"2026-04-29T15:48:41","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=2511"},"modified":"2026-04-29T08:49:23","modified_gmt":"2026-04-29T15:49:23","slug":"emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/","title":{"rendered":"Emerging Threat: (CVE-2026-3844) WordPress Breeze Cache Plugin Unauthenticated File Upload"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is CVE-2026-3844?<\/h2>\n\n\n\n<p>CVE-2026-3844 is an arbitrary file upload vulnerability in the Breeze Cache plugin for WordPress. The flaw lives in the <code>fetch_gravatar_from_remote<\/code> function inside <code>class-breeze-cache-cronjobs.php<\/code>.<\/p>\n\n\n\n<p>The function fetches Gravatar images from a remote URL and stores them locally in the WordPress uploads directory. It does not validate the file type or content of what it downloads. An attacker who controls the source URL can have the server fetch a PHP webshell instead of an image. The file lands in a location where PHP execution is allowed.<\/p>\n\n\n\n<p>The vulnerability carries a CVSS v3.1 base score of 9.8 (Critical). No authentication or user interaction is required. The only precondition is that the &#8220;Host Files Locally &#8211; Gravatars&#8221; option must be enabled in the plugin settings. That option is disabled by default.<\/p>\n\n\n\n<p>Active exploitation has been observed in the wild. Public threat telemetry has reported thousands of attack attempts in the days following disclosure. Exploitation is unauthenticated and network-based, which puts it at the easiest end of the spectrum.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by CVE-2026-3844?<\/h2>\n\n\n\n<p>The vulnerability affects the Breeze Cache plugin in all versions up to and including 2.4.4. Breeze is developed by Cloudways and has more than 400,000 active WordPress installations. It is used to speed up WordPress sites through caching, file optimization, and database cleanup.<\/p>\n\n\n\n<p>In practice, an affected asset is an internet-facing WordPress site running Breeze with local Gravatar hosting enabled. WordPress sites are almost always exposed to the public internet. The Breeze plugin runs as part of the standard WordPress request lifecycle, so the vulnerable endpoint is reachable from anywhere.<\/p>\n\n\n\n<p>The CPE strings observed in the affected asset set show two variants. Some assets carry the <code>wordpress_plugin:breeze<\/code> CPE without an explicit version. Others identify as the Cloudways-managed <code>cloudways:breeze<\/code> build at version 2.1.4. Both are below the patched 2.4.5 release.<\/p>\n\n\n\n<p>These sites also tend to be high-leverage targets. A successful upload places a webshell on a public-facing host. From there, an attacker can pivot into the WordPress database, harvest credentials, and use the site to host further payloads.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are fixes available?<\/h2>\n\n\n\n<p>Yes. Cloudways released Breeze Cache version 2.4.5, which fixes the issue. Site owners running Breeze should upgrade to 2.4.5 or later as the primary action.<\/p>\n\n\n\n<p>If an immediate upgrade is not possible, the published interim mitigation is to disable the &#8220;Host Files Locally &#8211; Gravatars&#8221; option in the Breeze settings. Disabling the feature blocks the vulnerable code path. Disabling Breeze entirely is also a viable temporary measure.<\/p>\n\n\n\n<p>Defenders should treat this as time-sensitive. Active exploitation is already in progress, and the exploit needs no credentials. Verify the plugin version directly on each WordPress site, and confirm the setting state on the host. A central inventory may not track plugin configuration.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other recommended actions to take?<\/h2>\n\n\n\n<p>Audit the WordPress uploads directory for unexpected files in <code>\/uploads\/breeze\/gravatars\/<\/code>. Pay particular attention to files with <code>.php<\/code>, <code>.phtml<\/code>, or <code>.phar<\/code> extensions. Review web server access logs for requests to <code>admin-ajax.php<\/code> with <code>fetch_gravatar_from_remote<\/code> parameters. Check for outbound connections from the web server to unfamiliar URLs near suspicious requests, since the exploit forces the server to fetch attacker-controlled content.<\/p>\n\n\n\n<p>Restrict PHP execution in the WordPress uploads directory at the web server level where possible. Apply WAF rules that block remote-URL parameters in Gravatar-related endpoints. After patching, rotate any credentials, API keys, or tokens stored on the affected hosts. A successful exploit grants the attacker read access to the WordPress installation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?<\/h2>\n\n\n\n<p>CyCognito published an Emerging Threat Advisory for CVE-2026-3844 in the CyCognito platform and is actively researching enhanced detection capabilities for this vulnerability.<\/p>\n\n\n\n<p>To learn how CyCognito can help your organization reduce external exposure and manage emerging threats more effectively, <a href=\"https:\/\/www.cycognito.com\/demo\/\">contact us to request a demo<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An unauthenticated arbitrary file upload vulnerability in the Breeze Cache plugin for WordPress allows attackers to drop a PHP webshell onto the server through the plugin&#8217;s Gravatar-fetching function, leading to remote code execution on affected sites.<\/p>\n","protected":false},"author":39,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2511","post","type-post","status-publish","format-standard","hentry","category-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threat: (CVE-2026-3844) WordPress Breeze Cache Plugin Unauthenticated File Upload | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threat: (CVE-2026-3844) WordPress Breeze Cache Plugin Unauthenticated File Upload | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"An unauthenticated arbitrary file upload vulnerability in the Breeze Cache plugin for WordPress allows attackers to drop a PHP webshell onto the server through the plugin&#039;s Gravatar-fetching function, leading to remote code execution on affected sites.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-29T15:48:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-29T15:49:23+00:00\" \/>\n<meta name=\"author\" content=\"Igal Zeifman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Igal Zeifman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/\"},\"author\":{\"name\":\"Igal Zeifman\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\"},\"headline\":\"Emerging Threat: (CVE-2026-3844) WordPress Breeze Cache Plugin Unauthenticated File Upload\",\"datePublished\":\"2026-04-29T15:48:41+00:00\",\"dateModified\":\"2026-04-29T15:49:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/\"},\"wordCount\":618,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/\",\"name\":\"Emerging Threat: (CVE-2026-3844) WordPress Breeze Cache Plugin Unauthenticated File Upload | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2026-04-29T15:48:41+00:00\",\"dateModified\":\"2026-04-29T15:49:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threat: (CVE-2026-3844) WordPress Breeze Cache Plugin Unauthenticated File Upload\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\",\"name\":\"Igal Zeifman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"caption\":\"Igal Zeifman\"},\"description\":\"VP of Marketing\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threat: (CVE-2026-3844) WordPress Breeze Cache Plugin Unauthenticated File Upload | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threat: (CVE-2026-3844) WordPress Breeze Cache Plugin Unauthenticated File Upload | CyCognito Blog","og_description":"An unauthenticated arbitrary file upload vulnerability in the Breeze Cache plugin for WordPress allows attackers to drop a PHP webshell onto the server through the plugin's Gravatar-fetching function, leading to remote code execution on affected sites.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/","og_site_name":"CyCognito Blog","article_published_time":"2026-04-29T15:48:41+00:00","article_modified_time":"2026-04-29T15:49:23+00:00","author":"Igal Zeifman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Igal Zeifman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/"},"author":{"name":"Igal Zeifman","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3"},"headline":"Emerging Threat: (CVE-2026-3844) WordPress Breeze Cache Plugin Unauthenticated File Upload","datePublished":"2026-04-29T15:48:41+00:00","dateModified":"2026-04-29T15:49:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/"},"wordCount":618,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/","name":"Emerging Threat: (CVE-2026-3844) WordPress Breeze Cache Plugin Unauthenticated File Upload | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2026-04-29T15:48:41+00:00","dateModified":"2026-04-29T15:49:23+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3844-wordpress-breeze-cache-plugin-unauthenticated-file-upload\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Threat: (CVE-2026-3844) WordPress Breeze Cache Plugin Unauthenticated File Upload"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3","name":"Igal Zeifman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","caption":"Igal Zeifman"},"description":"VP of Marketing","url":"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=2511"}],"version-history":[{"count":2,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2511\/revisions"}],"predecessor-version":[{"id":2513,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2511\/revisions\/2513"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=2511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=2511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=2511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}