Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
4.9

JetBackup Plugin for WordPress: Unauthorized Directory Deletion

CVE-2026-4853
Summary

The JetBackup plugin for WordPress allows an attacker with admin access to delete any directory on the server, potentially disabling all plugins and causing site disruption. This is due to a weakness in how the plugin handles file uploads. To fix this, update the plugin to version 3.1.19.9 or later, which addresses this issue.

Original title
The JetBackup – Backup, Restore & Migrate plugin for WordPress is vulnerable to Path Traversal leading to Arbitrary Directory Deletion in versions up to and including 3.1.19.8. This is due to insuf...
Original description
The JetBackup – Backup, Restore & Migrate plugin for WordPress is vulnerable to Path Traversal leading to Arbitrary Directory Deletion in versions up to and including 3.1.19.8. This is due to insufficient input validation on the fileName parameter in the file upload handler. The plugin sanitizes the fileName parameter using sanitize_text_field(), which removes HTML tags but does not prevent path traversal sequences like '../'. The unsanitized filename is then directly concatenated in Upload::getFileLocation() without using basename() or validating the resolved path stays within the intended directory. When an invalid file is uploaded, the cleanup logic calls dirname() on the traversed path and passes it to Util::rm(), which recursively deletes the entire resolved directory. This makes it possible for authenticated attackers with administrator-level access to traverse outside the intended upload directory and trigger deletion of critical WordPress directories such as wp-content/plugins, effectively disabling all installed plugins and causing severe site disruption.
nvd CVSS3.1 4.9
Vulnerability type
CWE-22 Path Traversal
Published: 17 Apr 2026 · Updated: 17 Apr 2026 · First seen: 17 Apr 2026