PT-2026-26723 · Fahad Mahmood · Keep Backup Daily
San6051
·
Published
2026-03-20
·
Updated
2026-03-21
·
CVE-2026-3577
CVSS v3.1
4.4
Medium
| AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N |
The Keep Backup Daily plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the backup title alias (
val parameter) in the update kbd bkup alias AJAX action in all versions up to, and including, 2.1.2. This is due to insufficient input sanitization and output escaping. While sanitize text field() strips HTML tags on save, it does not encode double quotes. The backup titles are output in HTML attribute contexts without esc attr(). This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts via attribute injection that will execute whenever another administrator views the backup list page.Fix
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Keep Backup Daily