CVE-2024-12008
W3 Total Cache <= 2.8.1 Information Exposure via Log Files
CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th
The W3 Total Cache plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.8.1 through the publicly exposed debug log file. This makes it possible for unauthenticated attackers to view potentially sensitive information in the exposed log file. For example, the log file may contain nonce values that can be used in further CSRF attacks. Note: the debug feature must be enabled for this to be a concern, and it is disabled by default.
| CWE | CWE-200 |
| Vendor | boldgrid |
| Product | w3 total cache |
| Published | Jan 14, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for boldgrid w3 total cache
Be the first to know when new medium vulnerabilities affecting boldgrid w3 total cache are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
boldgrid / W3 Total Cache
0 โค 2.8.1
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/8292f23c-fb17-4082-9788-f643d1bb097e?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/w3-total-cache/tags/2.8.0/Util_Environment.php#L430 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/w3-total-cache/tags/2.8.0/Util_Debug.php#L29
Credits
Villu Orav