Vulnerability Description
The Keep Backup Daily plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the backup title alias (`val` parameter) in the `update_kbd_bkup_alias` AJAX action in all versions up to, and including, 2.1.2. This is due to insufficient input sanitization and output escaping. While `sanitize_text_field()` strips HTML tags on save, it does not encode double quotes. The backup titles are output in HTML attribute contexts without `esc_attr()`. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts via attribute injection that will execute whenever another administrator views the backup list page.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/keep-backup-daily/tags/2.1.1/inc/func
- https://plugins.trac.wordpress.org/browser/keep-backup-daily/tags/2.1.1/inc/kbd_
- https://plugins.trac.wordpress.org/browser/keep-backup-daily/trunk/inc/functions
- https://plugins.trac.wordpress.org/browser/keep-backup-daily/trunk/inc/kbd_cron.
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old
- https://www.wordfence.com/threat-intel/vulnerabilities/id/18a4fa4b-5c99-4347-8b3
FAQ
What is CVE-2026-3577?
CVE-2026-3577 is a vulnerability with a CVSS score of 4.4 (MEDIUM). The Keep Backup Daily plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the backup title alias (`val` parameter) in the `update_kbd_bkup_alias` AJAX action in all versions up to, a...
How severe is CVE-2026-3577?
CVE-2026-3577 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3577?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.