PT-2026-26714 · Fahad Mahmood · Keep Backup Daily
San6051
·
Published
2026-03-20
·
Updated
2026-03-21
·
CVE-2026-3339
CVSS v3.1
2.7
Low
| AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N |
The Keep Backup Daily plugin for WordPress is vulnerable to Limited Path Traversal in all versions up to, and including, 2.1.1 via the
kbd open upload dir AJAX action. This is due to insufficient validation of the kbd path parameter, which is only sanitized with sanitize text field() - a function that does not strip path traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to list the contents of arbitrary directories on the server outside of the intended uploads directory.Fix
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Keep Backup Daily