Description

The Keep Backup Daily plugin for WordPress is vulnerable to Limited Path Traversal in all versions up to, and including, 2.1.1 via the `kbd_open_upload_dir` AJAX action. This is due to insufficient validation of the `kbd_path` parameter, which is only sanitized with `sanitize_text_field()` - a function that does not strip path traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to list the contents of arbitrary directories on the server outside of the intended uploads directory.

INFO

Published Date :

2026-03-20T23:25:09.949Z

Last Modified :

2026-03-24T13:39:30.198Z

Source :

Wordfence
AFFECTED PRODUCTS

The following products are affected by CVE-2026-3339 vulnerability.

Vendors Products
Fahadmahmood
  • Keep Backup Daily
Wordpress
  • Wordpress

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact