Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.1
Royal WordPress Backup & Restore Plugin: Admin Clickjacking Attack Possible
CVE-2026-4305
Summary
The Royal WordPress Backup & Restore Plugin is at risk of being exploited if an administrator is tricked into clicking on a malicious link. Attackers could inject malicious scripts into the plugin's interface, potentially stealing sensitive information or taking control of the site. Update to the latest version to fix this issue.
Original title
The Royal WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wpr_pending_template' parameter in all versions up to, and including, 1.0.1...
Original description
The Royal WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wpr_pending_template' parameter in all versions up to, and including, 1.0.16 due to insufficient input validation. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link.
nvd CVSS3.1
6.1
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
- https://plugins.trac.wordpress.org/browser/royal-backup-reset/tags/1.0.16/assets...
- https://plugins.trac.wordpress.org/browser/royal-backup-reset/tags/1.0.16/royal-...
- https://plugins.trac.wordpress.org/changeset?old_path=%2Froyal-backup-reset/tags...
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f9e0c658-b37c-4780-958...
Published: 10 Apr 2026 · Updated: 10 Apr 2026 · First seen: 10 Apr 2026