Database Backup for WordPress, CVE-2026-4030
- CVE, Research URL
- Home page URL
- Application
- Published on
- May 14, 2026
- Research Description
- The Database Backup for WordPress plugin for WordPress is vulnerable to unauthorized arbitrary file read and deletion in all versions up to, and including, 2.5.2. This is due to the plugin not properly enforcing the return value of its authorization check combined with a user-controlled backup directory parameter. This makes it possible for unauthenticated attackers to read and delete arbitrary files on the server, leading to Sensitive Information Exposure and potential site takeover. Note: This vulnerability is only exploitable in WordPress Multisite environments where the deprecated is_site_admin() function exists.
- Affected versions
-
max 2.5.3.
- Status
-
vulnerable
| Previous vulnerability researches |
|---|
| Elite crypto checkout (5168e230bf164d8e0ebd8f95ccf9add5694cd07c) , Jun 07, 2024 |