The W3 Total Cache WordPress plugin before 2.8.13 is vulnerable to command injection via the _parse_dynamic_mfunc function, allowing unauthenticated users to execute PHP commands by submitting a comment with a malicious payload to a post.

Project Subscriptions

Vendors Products
Wordpress Subscribe
W3 Total Cache Subscribe
Wordpress Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 17 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 17 Nov 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress w3 Total Cache
Wordpress wordpress
Vendors & Products Wordpress
Wordpress w3 Total Cache
Wordpress wordpress

Mon, 17 Nov 2025 06:15:00 +0000

Type Values Removed Values Added
Description The W3 Total Cache WordPress plugin before 2.8.13 is vulnerable to command injection via the _parse_dynamic_mfunc function, allowing unauthenticated users to execute PHP commands by submitting a comment with a malicious payload to a post.
Title W3 Total Cache < 2.8.13 - Unauthenticated Command Injection
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2025-11-17T19:19:15.463Z

Reserved: 2025-08-26T19:30:31.537Z

Link: CVE-2025-9501

cve-icon Vulnrichment

Updated: 2025-11-17T19:19:05.719Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-17T06:15:45.093

Modified: 2025-11-18T14:06:29.817

Link: CVE-2025-9501

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-17T15:15:17Z

Weaknesses

No weakness.