Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Fahad Mahmood Keep Backup Daily keep-backup-daily allows Path Traversal.This issue affects Keep Backup Daily: from n/a through <= 2.1.0.
Published: 2025-02-16
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Keep Backup Daily WordPress plugin suffers from a path traversal flaw (CWE-22) that permits an attacker to construct a download request which resolves to any file on the server. By supplying a specially crafted file path, a victim can retrieve sensitive files such as configuration files, credentials, or log files, thereby leaking confidential data. The flaw does not provide a mechanism for code execution or denial‑of‑service but can lead to information disclosure.

Affected Systems

Affected product is Fahad Mahmood’s Keep Backup Daily plugin for WordPress. All releases from the initial version up to and including 2.1.0 are vulnerable. Site operators running any of those versions should verify their current plugin version and apply an update as soon as a fixed release becomes available. The plugin may be installed on any publicly accessible WordPress site, creating a broad potential impact.

Risk and Exploitability

The CVSS base score of 4.9 classifies the vulnerability as medium, and the current EPSS score of <1% indicates a very low exploitation probability. It is not listed in CISA’s KEV catalog. Attackers would likely invoke the vulnerable download endpoint remotely, potentially needing authenticated access to the WordPress administrative interface if the feature is restricted, but the description does not confirm authentication requirements. Because the vector is remote and the flaw is a simple path traversal, it is considered potentially exploitable by anyone able to trigger the download functionality.

Generated by OpenCVE AI on May 1, 2026 at 16:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Keep Backup Daily plugin release that excludes the path traversal vulnerability.
  • If upgrading is not feasible, temporarily disable the plugin or remove its download functionality through its settings or by deactivating the plugin.
  • Ensure that the web server’s file permissions restrict access to sensitive directories and that the plugin’s data directories are not exposed to public download paths.
  • Optionally deploy a web application firewall rule to block requests containing directory traversal sequences such as "../" or "..\\".

Generated by OpenCVE AI on May 1, 2026 at 16:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-4242 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Fahad Mahmood Keep Backup Daily allows Path Traversal. This issue affects Keep Backup Daily: from n/a through 2.1.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Fahad Mahmood Keep Backup Daily allows Path Traversal. This issue affects Keep Backup Daily: from n/a through 2.1.0. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Fahad Mahmood Keep Backup Daily keep-backup-daily allows Path Traversal.This issue affects Keep Backup Daily: from n/a through <= 2.1.0.
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00063}

epss

{'score': 0.00096}


Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00081}

epss

{'score': 0.00063}


Tue, 18 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 16 Feb 2025 22:30:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Fahad Mahmood Keep Backup Daily allows Path Traversal. This issue affects Keep Backup Daily: from n/a through 2.1.0.
Title WordPress Keep Backup Daily plugin <= 2.1.0 - Arbitrary File Download vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:40.888Z

Reserved: 2025-02-14T06:53:43.230Z

Link: CVE-2025-26779

cve-icon Vulnrichment

Updated: 2025-02-18T17:30:08.893Z

cve-icon NVD

Status : Deferred

Published: 2025-02-16T23:15:11.630

Modified: 2026-04-23T15:25:57.963

Link: CVE-2025-26779

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T16:15:20Z

Weaknesses