Path Traversal Vulnerability in JetBackup Plugin for WordPress
CVE-2026-4853

4.9MEDIUM

What is CVE-2026-4853?

The JetBackup plugin for WordPress is susceptible to a Path Traversal vulnerability due to inadequate validation of the fileName parameter in its file upload handler. This security flaw allows authenticated users with administrator access to manipulate file paths, enabling them to delete critical directories outside the intended upload directory. Essentially, attackers can exploit this vulnerability to trigger recursive deletion actions, which can incapacitate essential WordPress components, severely disrupting the website's functionality.

Affected Version(s)

JetBackup – Backup, Restore & Migrate 0 <= 3.1.19.8

References

CVSS V3.1

Score:
4.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lukasz Sobanski
.