PT-2026-26714 · Fahad Mahmood · Keep Backup Daily

San6051

·

Published

2026-03-20

·

Updated

2026-03-21

·

CVE-2026-3339

CVSS v3.1

2.7

Low

AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
The Keep Backup Daily plugin for WordPress is vulnerable to Limited Path Traversal in all versions up to, and including, 2.1.1 via the kbd open upload dir AJAX action. This is due to insufficient validation of the kbd path parameter, which is only sanitized with sanitize text field() - a function that does not strip path traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to list the contents of arbitrary directories on the server outside of the intended uploads directory.

Fix

Path traversal

Weakness Enumeration

Related Identifiers

CVE-2026-3339

Affected Products

Keep Backup Daily