
Cloud Vulnerability DB
A community-led vulnerabilities database
The Keep Backup Daily WordPress plugin version 2.1.0 and earlier contains an Arbitrary File Download vulnerability, identified as CVE-2025-26779. This security issue was discovered by Caesar Evan Santoso and publicly disclosed on February 14, 2025. The vulnerability affects the plugin's file handling functionality and requires administrator privileges to exploit (Patchstack).
The vulnerability is classified as a path traversal issue, specifically an Improper Limitation of a Pathname to a Restricted Directory vulnerability. It has been assigned a CVSS v3.1 severity score of 4.9 (Low), indicating a relatively low-risk security issue. The vulnerability requires administrator-level access to exploit, which significantly limits its potential impact (Patchstack).
If exploited, this vulnerability could allow an authenticated administrator to download arbitrary files from the website. This includes potentially sensitive files such as configuration files containing login credentials or backup files. The impact is somewhat limited due to the high-privilege requirement for exploitation (Patchstack).
The vulnerability has been fixed in version 2.1.1 of the Keep Backup Daily plugin. Users are advised to update to this version or later to remediate the security issue. Given the low severity impact, virtual patching is deemed unnecessary (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."