A essential safety flaw has been found within the broadly used W3 Complete Cache WordPress plugin, placing over 1 million web sites at critical danger.
The vulnerability permits attackers to take full management of affected web sites while not having any login credentials.
| Area | Worth |
|---|---|
| CVE ID | CVE-2025-9501 |
| Plugin Identify | W3 Complete Cache |
| Affected Variations | Earlier than 2.8.13 |
| Mounted Model | 2.8.13+ |
| Vulnerability Kind | Unauthenticated Command Injection |
| CVSS Rating | 9.0 |
| CVSS Severity | Important |
The Vulnerability Defined
The W3 Complete Cache plugin, put in on greater than 1 million WordPress websites, incorporates a command injection vulnerability in variations earlier than 2.8.13.
The flaw exists within the _parse_dynamic_mfunc operate, a element of the plugin that processes web site content material.
Attackers can exploit this weak point by submitting malicious code hidden inside a touch upon any WordPress submit.
As a result of the vulnerability doesn’t require authentication, anybody can try the assault with out particular entry.
As soon as triggered, the injected instructions execute with the identical permissions because the WordPress web site itself, permitting attackers to run arbitrary PHP code and probably take over all the web site.
This vulnerability earned a essential CVSS rating of 9.0, reflecting its extreme nature. The assault is easy to carry out, requires no person interplay, and may be launched remotely from wherever on the web.
Attackers may use this to steal delicate knowledge, set up malware, deface web sites, or redirect guests to malicious websites.
The assault methodology is simple: a hacker must discover a susceptible WordPress web site operating W3 Complete Cache under model 2.8.13, submit a malicious remark containing PHP code, and the server will execute their instructions.
This makes it significantly harmful as a result of the assault requires minimal technical ability.
The vulnerability was publicly disclosed on October 27, 2025, giving attackers about three weeks of visibility earlier than this announcement.
Throughout this window, attackers have had the chance to focus on unpatched installations. Web site homeowners who haven’t up to date their plugin are nonetheless at fast danger.
The answer is simple: replace the W3 Complete Cache plugin to model 2.8.13 or newer instantly. This patched model incorporates the safety repair that closes the vulnerability.
WordPress web site directors must also evaluate their web site safety logs through the disclosure interval to examine for any suspicious remark exercise or unauthorized modifications.
It’s really helpful to examine for any malicious posts or feedback that attackers could have added.
Past updating the plugin, web site homeowners ought to think about implementing extra safety measures, together with common backups, safety plugins to observe for intrusions, and limiting remark posting to registered customers solely.
Maintaining all WordPress plugins, themes, and core information updated is important for sustaining a safe web site.
The W3 Complete Cache plugin stays widespread for enhancing web site efficiency. Nonetheless, like all software program, it requires common updates to take care of safety.
Observe us on Google Information, LinkedIn, and X to Get Prompt Updates and set GBH as a Most well-liked Supply in Google.

