A critical vulnerability in the Breeze Cache WordPress plugin is being actively exploited by hackers, allowing them to upload arbitrary files to servers without authentication. This bug enables attackers to execute malicious code, potentially leading to full server compromise. The vulnerability is particularly severe, as it does not require any authentication, making it easily accessible to malicious actors. As a result, WordPress sites using the Breeze Cache plugin are at risk of being compromised, highlighting the need for immediate patching or mitigation1. The exploitation of this vulnerability can have severe consequences, including data breaches, malware distribution, and defacement of websites. So what matters to practitioners is that they must take immediate action to update or remove the vulnerable plugin to prevent their sites from being exploited, as the vulnerability can be used to gain unauthorized access to sensitive data and systems.
Hackers exploit file upload bug in Breeze Cache WordPress plugin
⚠️ Critical Alert
Why This Matters
Hackers are actively exploiting a critical vulnerability in the Breeze Cache plugin for WordPress that allows uploading arbitrary files on the server without authentication.
References
- BleepingComputer. (2026, April 23). Hackers exploit file upload bug in Breeze Cache WordPress plugin. *BleepingComputer*. https://www.bleepingcomputer.com/news/security/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-plugin/
Original Source
BleepingComputer
Read original →