Description
Improper Validation of Specified Quantity in Input vulnerability in BoldGrid W3 Total Cache w3-total-cache allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects W3 Total Cache: from n/a through <= 2.9.1.
Published: 2026-03-05
Score: 9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

This vulnerability arises from improper validation of the quantity input in the BoldGrid W3 Total Cache plugin, enabling attackers to invoke functionality that should be protected by access control lists. Because the plugin processes the quantity parameter without adequate checks, an attacker can execute arbitrary code on the server, effectively compromising the entire WordPress installation. The flaw directly undermines the integrity and confidentiality of the host, allowing full system compromise if exploited. The weakness is a classic example of unauthorized modification of software, as categorized by CWE-1284.

Affected Systems

The affected product is BoldGrid’s W3 Total Cache WordPress plugin. All releases from the earliest available version up to and including 2.9.1 are susceptible. Users running any of these versions on their WordPress sites expose themselves to this issue.

Risk and Exploitability

The CVSS v3.1 base score of 9.0 rates the flaw as critical, indicating a modern attacker could gain full control after successful exploitation. The EPSS score of less than 1% suggests that widespread exploitation has not yet occurred, and the vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities catalog. Nonetheless, because the flaw permits arbitrary code execution and requires no special privileges beyond those with access to the plugin’s settings, the likelihood of successful attacks in environments with exposed WordPress administration interfaces remains non‑trivial. Attackers would likely leverage authenticated access or misconfigured permissions to exploit the quantity parameter described in the plugin’s source code.

Generated by OpenCVE AI on April 15, 2026 at 23:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest version of the W3 Total Cache plugin (≥ 2.9.2) where the quantity input is properly validated and ACL checks are enforced.
  • If an upgrade is not immediately feasible, remove or deactivate the plugin to eliminate the path for exploitation.
  • As a temporary measure, restrict administrator privileges in WordPress so that only trusted staff can access the plugin’s settings, thereby reducing the window of opportunity for an attacker.

Generated by OpenCVE AI on April 15, 2026 at 23:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Boldgrid
Boldgrid w3 Total Cache
Wordpress
Wordpress wordpress
Vendors & Products Boldgrid
Boldgrid w3 Total Cache
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Validation of Specified Quantity in Input vulnerability in BoldGrid W3 Total Cache w3-total-cache allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects W3 Total Cache: from n/a through <= 2.9.1.
Title WordPress W3 Total Cache plugin <= 2.9.1 - Arbitrary Code Execution vulnerability
Weaknesses CWE-1284
References

Subscriptions

Boldgrid W3 Total Cache
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:51:57.156Z

Reserved: 2026-02-19T09:51:58.587Z

Link: CVE-2026-27384

cve-icon Vulnrichment

Updated: 2026-03-09T15:45:43.218Z

cve-icon NVD

Status : Deferred

Published: 2026-03-05T06:16:27.840

Modified: 2026-04-22T21:26:58.303

Link: CVE-2026-27384

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T23:45:05Z

Weaknesses