Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
2.7
Keep Backup Daily plugin for WordPress: Unauthorized File Access
CVE-2026-3339
Summary
The Keep Backup Daily plugin for WordPress is vulnerable to unauthorized access to server files. Attackers with Administrator-level access can list the contents of any directory on the server. To protect your site, update the plugin to the latest version or remove and replace it with a secure alternative.
Original title
The Keep Backup Daily plugin for WordPress is vulnerable to Limited Path Traversal in all versions up to, and including, 2.1.1 via the `kbd_open_upload_dir` AJAX action. This is due to insufficient...
Original description
The Keep Backup Daily plugin for WordPress is vulnerable to Limited Path Traversal in all versions up to, and including, 2.1.1 via the `kbd_open_upload_dir` AJAX action. This is due to insufficient validation of the `kbd_path` parameter, which is only sanitized with `sanitize_text_field()` - a function that does not strip path traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to list the contents of arbitrary directories on the server outside of the intended uploads directory.
nvd CVSS3.1
2.7
Vulnerability type
CWE-22
Path Traversal
- https://plugins.trac.wordpress.org/browser/keep-backup-daily/tags/2.1.1/inc/func...
- https://plugins.trac.wordpress.org/browser/keep-backup-daily/tags/2.1.1/inc/func...
- https://plugins.trac.wordpress.org/browser/keep-backup-daily/trunk/inc/functions...
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old...
- https://www.wordfence.com/threat-intel/vulnerabilities/id/01984754-e332-4500-99a...
Published: 21 Mar 2026 · Updated: 21 Mar 2026 · First seen: 21 Mar 2026