CVE-2026-3339: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in fahadmahmood Keep Backup Daily
The Keep Backup Daily plugin for WordPress is vulnerable to Limited Path Traversal in all versions up to, and including, 2.1.1 via the `kbd_open_upload_dir` AJAX action. This is due to insufficient validation of the `kbd_path` parameter, which is only sanitized with `sanitize_text_field()` - a function that does not strip path traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to list the contents of arbitrary directories on the server outside of the intended uploads directory.
AI Analysis
Technical Summary
The Keep Backup Daily plugin for WordPress, maintained by fahadmahmood, suffers from a path traversal vulnerability identified as CVE-2026-3339. This vulnerability exists in all versions up to and including 2.1.1 and is triggered via the 'kbd_open_upload_dir' AJAX action. The root cause is insufficient validation of the 'kbd_path' parameter, which is only sanitized using WordPress's 'sanitize_text_field()' function. This function does not remove or neutralize path traversal sequences such as '../', allowing an attacker with administrator-level privileges to manipulate the path parameter to access directories outside the intended upload directory. Consequently, an attacker can list contents of arbitrary directories on the server, potentially exposing sensitive file names and directory structures. However, the vulnerability does not allow modification or deletion of files, nor does it enable remote code execution or denial of service. Exploitation requires authenticated access with administrator privileges, and no user interaction beyond that is needed. The CVSS 3.1 base score is 2.7, indicating low severity primarily due to the high privilege requirement and limited impact on confidentiality only. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability falls under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory).
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of directory contents outside the intended upload directory, which can reveal sensitive information such as configuration files, backup files, or other data stored on the server. While this does not directly compromise system integrity or availability, the exposure of directory listings can aid attackers in reconnaissance and facilitate further attacks. Since exploitation requires administrator-level access, the risk is somewhat mitigated by the need for high privileges; however, if an attacker gains such access (e.g., via credential compromise or privilege escalation), they can leverage this vulnerability to gather additional information about the server environment. Organizations using the Keep Backup Daily plugin on WordPress sites may face increased risk of information leakage, which could be leveraged in targeted attacks or lateral movement within the network. The low CVSS score reflects the limited scope and impact, but the vulnerability still represents a security weakness that should be addressed to maintain defense-in-depth.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first update the Keep Backup Daily plugin to a version that addresses this issue once available. In the absence of an official patch, administrators can implement custom input validation to strictly restrict the 'kbd_path' parameter, disallowing any path traversal sequences such as '../' or absolute paths. This can be done by whitelisting allowed directories or normalizing and validating paths before processing. Additionally, limit administrator access strictly to trusted personnel and enforce strong authentication mechanisms to reduce the risk of privilege abuse. Regularly audit plugin usage and monitor logs for suspicious AJAX requests targeting 'kbd_open_upload_dir'. Employ web application firewalls (WAFs) with rules to detect and block path traversal attempts. Finally, consider isolating WordPress installations and backups on separate file systems or containers to minimize the impact of directory traversal vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Brazil, Netherlands, Japan
CVE-2026-3339: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in fahadmahmood Keep Backup Daily
Description
The Keep Backup Daily plugin for WordPress is vulnerable to Limited Path Traversal in all versions up to, and including, 2.1.1 via the `kbd_open_upload_dir` AJAX action. This is due to insufficient validation of the `kbd_path` parameter, which is only sanitized with `sanitize_text_field()` - a function that does not strip path traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to list the contents of arbitrary directories on the server outside of the intended uploads directory.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Keep Backup Daily plugin for WordPress, maintained by fahadmahmood, suffers from a path traversal vulnerability identified as CVE-2026-3339. This vulnerability exists in all versions up to and including 2.1.1 and is triggered via the 'kbd_open_upload_dir' AJAX action. The root cause is insufficient validation of the 'kbd_path' parameter, which is only sanitized using WordPress's 'sanitize_text_field()' function. This function does not remove or neutralize path traversal sequences such as '../', allowing an attacker with administrator-level privileges to manipulate the path parameter to access directories outside the intended upload directory. Consequently, an attacker can list contents of arbitrary directories on the server, potentially exposing sensitive file names and directory structures. However, the vulnerability does not allow modification or deletion of files, nor does it enable remote code execution or denial of service. Exploitation requires authenticated access with administrator privileges, and no user interaction beyond that is needed. The CVSS 3.1 base score is 2.7, indicating low severity primarily due to the high privilege requirement and limited impact on confidentiality only. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability falls under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory).
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of directory contents outside the intended upload directory, which can reveal sensitive information such as configuration files, backup files, or other data stored on the server. While this does not directly compromise system integrity or availability, the exposure of directory listings can aid attackers in reconnaissance and facilitate further attacks. Since exploitation requires administrator-level access, the risk is somewhat mitigated by the need for high privileges; however, if an attacker gains such access (e.g., via credential compromise or privilege escalation), they can leverage this vulnerability to gather additional information about the server environment. Organizations using the Keep Backup Daily plugin on WordPress sites may face increased risk of information leakage, which could be leveraged in targeted attacks or lateral movement within the network. The low CVSS score reflects the limited scope and impact, but the vulnerability still represents a security weakness that should be addressed to maintain defense-in-depth.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first update the Keep Backup Daily plugin to a version that addresses this issue once available. In the absence of an official patch, administrators can implement custom input validation to strictly restrict the 'kbd_path' parameter, disallowing any path traversal sequences such as '../' or absolute paths. This can be done by whitelisting allowed directories or normalizing and validating paths before processing. Additionally, limit administrator access strictly to trusted personnel and enforce strong authentication mechanisms to reduce the risk of privilege abuse. Regularly audit plugin usage and monitor logs for suspicious AJAX requests targeting 'kbd_open_upload_dir'. Employ web application firewalls (WAFs) with rules to detect and block path traversal attempts. Finally, consider isolating WordPress installations and backups on separate file systems or containers to minimize the impact of directory traversal vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-27T15:17:08.862Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bdda56b462d409683a8be7
Added to database: 3/20/2026, 11:37:58 PM
Last enriched: 3/20/2026, 11:39:24 PM
Last updated: 3/21/2026, 3:32:59 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.