Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks

PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks

Posted on November 24, 2025November 24, 2025 By CWS

A proof-of-concept exploit has been publicly launched for CVE-2025-9501, a crucial, unauthenticated command-injection vulnerability affecting W3 Whole Cache, one in every of WordPress’s most generally deployed caching plugins.

With over 1 million lively installations, the vulnerability poses a big threat to numerous web sites worldwide.

RCE Safety discovers that the flaw exists in W3 Whole Cache’s dynamic content material parsing performance, particularly within the _parse_dynamic_mfunc perform throughout the PgCache_ContentGrabber class.

The weak code makes use of PHP’s eval() perform to execute code derived from cached web page content material, making a direct code injection vector.

Web page Cache is enabled within the plugin

Unauthenticated Command Injection Found

RCESecurity researchers analyzed WPScan’s preliminary advisory and developed a working exploit to validate the vulnerability’s severity.

The vulnerability requires particular circumstances to be exploitable. Attackers should know the W3TC_DYNAMIC_SECURITY fixed worth outlined within the website’s wp-config.php file.

Moreover, web page caching have to be enabled (core performance however disabled by default), and web site feedback have to be permitted for unauthenticated customers.

If these circumstances align, attackers can inject arbitrary PHP code via specifically crafted HTML feedback in cached pages, reaching full distant code execution.

PropertyValueCVE IDCVE-2025-9501Vulnerability TypeUnauthenticated Command Injection / Distant Code ExecutionAffected PluginW3 Whole CacheAffected VersionsVersions with weak code in PgCache_ContentGrabber classAttack VectorCached web page content material with malicious mfunc commentsImpactRemote Code Execution, Full Server CompromiseStatusExploit PoC Launched

When the web page cache processes a request, it invokes the weak _parse_dynamic perform, which searches cached content material for specifically formatted mfunc remark tags.

If an attacker is aware of the W3TC_DYNAMIC_SECURITY worth, they will inject malicious PHP code inside these tags. The code then executes straight on the server, granting attackers shell-level entry.

A easy injection like echo passthru($_GET[1337]) permits command execution.

Whereas technically easy to take advantage of as soon as preconditions are met, the vulnerability’s real-world affect depends upon WordPress administrator practices.

Websites utilizing the W3TC_DYNAMIC_SECURITY characteristic with default values or weak secrets and techniques face heightened threat.

 Feedback are enabled for unauthenticated customers

The mixture of widespread plugin adoption and the power to execute arbitrary code positions this as a crucial risk.

RCESecurity recommends that Web site directors utilizing W3 Whole Cache instantly evaluate their safety configurations, flip off the characteristic if unused, or apply out there patches.

The vulnerability underscores the significance of safe coding practices, significantly avoiding dynamic code analysis capabilities like eval() in security-sensitive contexts.

Web site house owners ought to instantly evaluate W3 Whole Cache configurations, replace to patched variations when out there, and take into account disabling dynamic content material caching if it isn’t actively used.

Organizations operating penetration assessments ought to incorporate this vulnerability into their evaluation protocols to determine uncovered situations inside their infrastructure.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attacks, Cache, Exposes, Million, PoC, RCE, Released, Total, Vulnerability, Websites

Post navigation

Previous Post: CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
Next Post: Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention

Related Posts

Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched Cyber Security News
SecurityMetrics Wins “Data Leak Detection Solution of the Year” at the 2025 CyberSecurity Breakthrough Awards SecurityMetrics Wins “Data Leak Detection Solution of the Year” at the 2025 CyberSecurity Breakthrough Awards Cyber Security News
Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware Cyber Security News
APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins Cyber Security News
Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network Cyber Security News
Discord Data Breach – 1.5 TB of Data and 2 Million Government ID Photos Extorted Discord Data Breach – 1.5 TB of Data and 2 Million Government ID Photos Extorted Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News