Hackers Exploit Critical Breeze Cache Flaw in WordPress Sites
A file-upload bug in the Breeze Cache plugin is under active exploitation, but only sites with the optional “Host Files Locally – Gravatars” feature enabled appear exposed. The issue highlights how a niche plugin setting can create outsized risk across a large WordPress install base.
VALENCIA, SPAIN — Threat actors have begun actively weaponizing a critical file-upload vulnerability in Breeze, a popular WordPress caching plugin. Tracked as CVE-2026-3844, the flaw allows unauthenticated attackers to upload malicious files to a web server, potentially leading to full Remote Code Execution (RCE) and total site takeover.
Security monitors, including those from WPScan and Security Affairs, report an immediate surge in malicious activity following the bug's discovery. In one 24-hour window, researchers recorded over 170 exploitation attempts and thousands of automated blocks, signaling that scanning botnets have already integrated the exploit into their rotation.
The "Niche Feature" Trap
The most striking element of CVE-2026-3844 is its dependency on a specific, optional configuration. The vulnerability is tied to the “Host Files Locally – Gravatars” feature. When enabled, this setting attempts to improve site performance by downloading and serving user avatars directly from the local server rather than external Gravatar servers.
Due to a weakness in how the plugin handles these file transfers, attackers can bypass security checks to upload non-image files — such as PHP webshells. While the plugin is installed on upwards of 400,000 sites, the actual "blast radius" is likely smaller, limited only to those administrators who manually toggled this specific performance feature.
Active Exploitation in the Wild
Reports from Tenable and BleepingComputer confirm that this is not a theoretical risk. Attackers are currently using the flaw as an initial foothold. Once a webshell is successfully uploaded, it can be used for:
- Payload Delivery: Injecting ransomware or SEO spam into the site database.
- Credential Harvesting: Accessing
wp-config.phpto steal database credentials. - Lateral Movement: Using the compromised web server to attack other systems within the same hosting environment.
This incident reinforces a recurring theme in WordPress security: the most dangerous vulnerabilities often hide in secondary features that expand a site's attack surface beyond the core CMS.
Defender Guidance: Patch and Audit
Because this flaw is under active attack, site owners using Breeze Cache should treat remediation as a top priority.
- Immediate Update: Update the Breeze Cache plugin to the latest patched version (check the WordPress plugin repository for the most recent release).
- Feature Audit: If you cannot update immediately, disable the "Host Files Locally – Gravatars" feature in the Breeze settings menu.
- Integrity Check: Scan your
/wp-content/uploads/directory for any unexpected.phpfiles or suspicious scripts that may have been placed during the initial exploitation window. - Log Monitoring: Watch for unauthenticated POST requests to the plugin’s admin-ajax handlers, which may indicate scanning activity.
The CyberSignal Analysis: Strategic Signals
Signal 01 — The Risk of "Performance at Any Cost"
The desire for faster page load times often leads admins to enable "optimization" features without auditing the security trade-offs. This incident proves that even a small utility meant to cache avatars can become a critical entry point if it handles file writes incorrectly.
Signal 02 — KEV-Style Urgency for CMS
WordPress plugins are effectively the "supply chain" of the small-to-medium business (SMB) world. When a plugin flaw enters active exploitation, it should be treated with the same urgency as a "Known Exploited Vulnerability" (KEV) in enterprise software.
Signal 03 — Targeted Scraping for Configuration
Attackers are no longer just looking for "outdated WordPress." They are specifically fingerprinting sites that use specific settings. This requires defenders to move beyond simple version patching and start practicing "feature-level" attack surface reduction.