PT-2026-26723 · Fahad Mahmood · Keep Backup Daily

San6051

·

Published

2026-03-20

·

Updated

2026-03-21

·

CVE-2026-3577

CVSS v3.1

4.4

Medium

AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
The Keep Backup Daily plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the backup title alias (val parameter) in the update kbd bkup alias AJAX action in all versions up to, and including, 2.1.2. This is due to insufficient input sanitization and output escaping. While sanitize text field() strips HTML tags on save, it does not encode double quotes. The backup titles are output in HTML attribute contexts without esc attr(). This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts via attribute injection that will execute whenever another administrator views the backup list page.

Fix

XSS

Weakness Enumeration

Related Identifiers

CVE-2026-3577

Affected Products

Keep Backup Daily