Home

Description

The Breeze - WordPress Cache Plugin plugin for WordPress is vulnerable to unauthorized cache clearing in all versions up to, and including, 2.2.21. This is due to the REST API endpoint `/wp-json/breeze/v1/clear-all-cache` being registered with `permission_callback => '__return_true'` and authentication being disabled by default when the API is enabled. This makes it possible for unauthenticated attackers to clear all site caches (page cache, Varnish, and Cloudflare) via a simple POST request, granted the administrator has enabled the API integration feature.

PUBLISHED Reserved 2025-12-01 | Published 2026-02-19 | Updated 2026-02-19 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-02-18:Disclosed

Credits

NosleeP finder

References

www.wordfence.com/...-65e5-4fe9-b7f0-2e021534c054?source=cve

plugins.trac.wordpress.org/....2.21/inc/class-breeze-api.php

plugins.trac.wordpress.org/....2.21/inc/class-breeze-api.php

plugins.trac.wordpress.org/...gs/2.2.21/inc/breeze-admin.php

plugins.trac.wordpress.org/...40breeze&sfp_email=&sfph_mail=

cve.org (CVE-2025-13864)

nvd.nist.gov (CVE-2025-13864)

Download JSON