All Systems Operational

PHP Services Operational
LAN Operational
PHX Operational
IIS Services Operational
LAN Operational
PHX Operational
MariaDB Operational
LAN Operational
PHX Operational
MSSQL Operational
LAN Operational
PHX Operational
FTP Operational
LAN Operational
PHX Operational
Management Portal Operational
Management Portal Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance

Scheduled Maintenance

Scheduled Network Maintenance – CloudSites Network Infrastructure Jan 17, 2026 16:00-21:00 CST

Liquid Web engineers will be performing scheduled network maintenance to upgrade network hardware for improved performance and stability.

Maintenance Window: Saturday, January 17th, 9:00 PM – 2:00 AM EDT

During this maintenance window, websites hosted under your CloudSites account may experience up to 2 minutes of downtime.

You can subscribe to receive further updates regarding this maintenance above.

Our support team is on hand should you need any assistance or have any questions or concerns. You can reach us through the following channels:

Live Chat via the Customer Portal: https://my.liquidweb.com

Email: support@liquidweb.com

We appreciate your understanding and patience as we work to enhance our service.

Thank you for your continued support.

Internal System Maintenance Reference: CC-13058

Posted on Jan 05, 2026 - 07:44 CST
Jan 16, 2026

No incidents reported today.

Jan 15, 2026

No incidents reported.

Jan 14, 2026

No incidents reported.

Jan 13, 2026

No incidents reported.

Jan 12, 2026

No incidents reported.

Jan 11, 2026

No incidents reported.

Jan 10, 2026

No incidents reported.

Jan 9, 2026

No incidents reported.

Jan 8, 2026

No incidents reported.

Jan 7, 2026

No incidents reported.

Jan 6, 2026

No incidents reported.

Jan 5, 2026
Resolved - As per our last update, we identified that some customer accounts were using a vulnerable version of the W3 Total Cache plugin (versions below 2.8.13). We reached out directly to the impacted accounts via support cases to inform them of the issue and the potential impact of this vulnerability.

We strongly recommend updating the plugin to the latest available version if it has not already been updated.

At this time, no further action is required for customers who have already updated to the latest version.

If you need any assistance with this update, please reach out to our support team. we’re happy to help apply the patch.

Jan 5, 07:22 CST
Update - We have identified that some customer accounts are still using a vulnerable version of the W3 Total Cache plugin (versions below 2.8.13).

We have reached out directly to the impacted accounts via support cases to inform them of the issue and the potential impact of this vulnerability.

We strongly recommend updating the plugin to the latest available version as soon as possible.

If you need any assistance with this update, please reach out to our support team; we’re happy to help with applying the patch.

Dec 2, 14:13 CST
Identified - A critical vulnerability has been disclosed in the W3 Total Cache WordPress plugin affecting versions below 2.8.13. This issue (CVE-2025-9501) is a command injection vulnerability that can be exploited without authentication via the _parse_dynamic_mfunc function by submitting a specially crafted comment, potentially allowing remote code execution on affected sites.

More information can be found here:
https://wpscan.com/vulnerability/6697a2c9-63ae-42f0-8931-f2e5d67d45ae/

The vulnerability is rated CVSS 9.0 (Critical), and a fixed version is available in W3 Total Cache 2.8.13 and later.
We strongly suggest that all clients using the W3 Total Cache plugin with WordPress immediately update that plugin to the latest version.

IMPORTANT: The public proof of concept (PoC) has been released with information on how the vulnerability can be exploited, which may increase the likelihood of compromise attempts.

Nov 24, 15:49 CST
Jan 4, 2026

No incidents reported.

Jan 3, 2026

No incidents reported.

Jan 2, 2026

No incidents reported.