Popular WordPress plugin with over a million downloads might have a concerning security vulnerability – here’s what we’ve discovered

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

W3 Total Cache Plugin Vulnerability Exposes Sites to PHP Injection Risks

  • CVE-2025-9501 vulnerability permits unauthenticated PHP command injection.
  • All versions prior to 2.8.13 are affected; approximately 327,000+ websites are vulnerable.
  • WPScan plans to release an exploit on November 24, escalating mass exploitation fears.

The W3 Total Cache (W3TC) plugin, utilized by over a million WordPress users, harbors a significant vulnerability that could allow malicious actors to seize control of affected websites, cybersecurity experts have alerted.

This flaw, classified as a command injection vulnerability, enables an assailant to execute PHP commands by submitting a tainted comment to a post. Alarmingly, authentication is not required, facilitating unauthorized access.

Designated as CVE-2025-9501, the vulnerability boasts a critical severity rating of 9.0 out of 10 and impacts all versions released before 2.8.13.

Imminent November 24 Deadline

To mitigate this risk, users are advised to upgrade to version 2.8.13, which became available on October 20.

Data from WordPress.org indicates that while 67.3% of installations have updated to version 2.8, the remaining 32.7% are still vulnerable. This translates to at least 327,000 sites at continued risk.

Notably, the statistic does not guarantee that all of the updated installations are safe with version 2.8.13, suggesting a potentially higher number of vulnerable websites still exist.

WordPress-SEO-Plugin-W3-Total-Cache

According to WPScan’s security advisory, a Proof-of-Concept (PoC) exploit is set for release on November 24. Prior to this date, they anticipate that many site administrators will secure their plugins with the updated version.

Historically, the release of a PoC often triggers mass exploitation, as numerous threat actors opt for readily available exploits rather than developing their own. Thus, it is imperative for WordPress site proprietors and administrators to enact updates without delay.

Source link: Techradar.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading