W3 Total Cache plugin flaw exposes 1 million WordPress sites to attacks
A severe flaw in the W3 Total Cache plugin installed on more than one million WordPress sites could give attackers access to various information, including metadata on cloud-based apps.
The W3 Total Cache plugin uses multiple caching techniques to optimize a website's speed, reduce load times, and generally improve its SEO ranking.
The flaw is tracked as CVE-2024-12365 despite the developer releasing a fix in the latest version of the product, hundreds of thousands of websites have still to install the patched variant.
Vulnerability details
Wordfence notes that the security issue is due to a missing capability check in the ‘is_w3tc_admin_page’ function in all versions up to the latest one, 2.8.2. This fault allows access to the plugin's security nonce value and perform unauthorized actions.
Exploiting the vulnerability is possible if the attacker is authenticated and has at least subscriber-level, a condition that is easily met.
The main risks that arise from the exploitation of CVE-2024-12365 are:
- Server-Side Request Forgery (SSRF): make web requests that could potentially expose sensitive data, including instance metadata on cloud-based apps
- Information disclosure
- Service abuse: consume cache service limits, which impact site performance and can generate increased costs
Regarding the real-world impact of this flaw, attackers could use the website’s infrastructure to proxy requests to other services and use the collected information to stage further attacks.
The best action for impacted users is to take is to upgrade to the latest version of W3 Total Cache version, 2.8.2, which addresses the vulnerability.
Download statistics from wordpress.org indicate that roughly 150,000 websites installed the plugin after the developer released the most recent update, leaving hundreds of thousands of WordPress sites still vulnerable.
As a general recommendations, website owners should avoid installing too many plugins and discard the products that are not absolutely necessary.
Additionally, a web application firewall could prove beneficial as it could identify and block exploitation attempts.
Biden's Cybersecurity EO Leaves Trump a Comprehensive Blueprint for Defense
Microsoft expands testing of Windows 11 admin protection feature
CVE-2024-20439 Cisco Smart Licensing Utility Static Credential Vulnerability
CVE-2025-2783 Google Chromium Mojo Sandbox Escape Vulnerability
CVE-2019-9874 Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability
CVE-2019-9875 Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability
CVE-2025-30154 reviewdog/action-setup GitHub Action Embedded Malicious Code Vulnerability
CVE-2025-1316 Edimax IC-7100 IP Camera OS Command Injection Vulnerability
CVE-2024-48248 NAKIVO Backup and Replication Absolute Path Traversal Vulnerability
CVE-2017-12637 SAP NetWeaver Directory Traversal Vulnerability
CVE-2025-24472 Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability
InformationalInformation Disclosure - Suspicious Comments
InformationalRe-examine Cache-control Directives
Free online web security scanner