Low severity2.7NVD Advisory· Published Mar 21, 2026· Updated Apr 22, 2026
CVE-2026-3339
CVE-2026-3339
Description
The Keep Backup Daily plugin for WordPress is vulnerable to Limited Path Traversal in all versions up to, and including, 2.1.1 via the kbd_open_upload_dir AJAX action. This is due to insufficient validation of the kbd_path parameter, which is only sanitized with sanitize_text_field() - a function that does not strip path traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to list the contents of arbitrary directories on the server outside of the intended uploads directory.
Affected products
1- Range: <=2.1.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- plugins.trac.wordpress.org/browser/keep-backup-daily/tags/2.1.1/inc/functions.phpnvd
- plugins.trac.wordpress.org/browser/keep-backup-daily/tags/2.1.1/inc/functions.phpnvd
- plugins.trac.wordpress.org/browser/keep-backup-daily/trunk/inc/functions.phpnvd
- plugins.trac.wordpress.org/changesetnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/01984754-e332-4500-99a2-10a7b79967f5nvd
News mentions
0No linked articles in our index yet.