A critical vulnerability has been reported in the W3 Total Cache WordPress plugin, which could allow an unauthenticated, remote attacker to execute arbitrary PHP code on the targeted system.
Target Audience:
Administrators and organisations using WordPress websites with the W3 Total Cache plugin installed.
Risk Assessment:
High likelihood of exploitation due to unauthenticated access through public comment submission.
Impact Assessment:
Potential data theft, malware deployment, or complete website takeover.
The information provided herein is on "as is" basis, without warranty of any kind.