Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4853: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in backupguard JetBackup – Backup, Restore & Migrate

0
Medium
VulnerabilityCVE-2026-4853cvecve-2026-4853cwe-22
Published: Fri Apr 17 2026 (04/17/2026, 03:36:43 UTC)
Source: CVE Database V5
Vendor/Project: backupguard
Product: JetBackup – Backup, Restore & Migrate

Description

JetBackup – Backup, Restore & Migrate plugin for WordPress versions up to 3. 1. 19. 8 contains a path traversal vulnerability in the file upload handler. This flaw allows authenticated administrators to use crafted filenames to traverse directories and cause arbitrary directory deletion outside the intended upload folder. The vulnerability arises because the plugin sanitizes filenames insufficiently and does not validate the resolved file path properly. Exploitation can lead to deletion of critical WordPress directories such as wp-content/plugins, resulting in disabling all installed plugins and severe site disruption. The CVSS score is 4. 9, indicating medium severity. No official patch or remediation guidance is currently available from the vendor.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/17/2026, 04:47:17 UTC

Technical Analysis

CVE-2026-4853 is a path traversal vulnerability in the JetBackup – Backup, Restore & Migrate WordPress plugin (up to version 3.1.19.8). The vulnerability is due to insufficient input validation on the fileName parameter in the file upload handler. The plugin uses sanitize_text_field() which does not prevent path traversal sequences like '../'. The unsanitized filename is concatenated directly in Upload::getFileLocation() without basename() or path validation. When an invalid file is uploaded, cleanup logic calls dirname() on the traversed path and passes it to Util::rm(), which recursively deletes the resolved directory. Authenticated attackers with administrator privileges can exploit this to delete critical directories such as wp-content/plugins, causing severe site disruption. The CVSS v3.1 score is 4.9 (medium severity), with no known exploits or official remediation available.

Potential Impact

Successful exploitation allows an authenticated administrator to delete arbitrary directories outside the intended upload directory, including critical WordPress directories like wp-content/plugins. This results in disabling all installed plugins and causing significant disruption to the WordPress site. The vulnerability does not impact confidentiality or integrity directly but causes high availability impact by deleting essential files.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict administrator access to trusted users only and monitor for suspicious file upload activity. Avoid uploading files with untrusted filenames. Consider disabling or limiting the use of the vulnerable plugin if possible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-03-25T15:15:15.547Z
Cvss Version
3.1
State
PUBLISHED
Remediation Level
null

Threat ID: 69e1b7b882d89c981f6ce741

Added to database: 4/17/2026, 4:31:52 AM

Last enriched: 4/17/2026, 4:47:17 AM

Last updated: 4/17/2026, 6:00:09 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses