LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-1311 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: February 27, 2026

Worry Proof Backup WordPress plugin - Path Traversal & Remote Code Execution

Published: February 26, 2026Updated: February 27, 2026Remote Exploitable

Overview

Worry Proof Backup WordPress plugin <= 0.2.4 contains a path traversal vulnerability in backup upload functionality, letting authenticated attackers with Subscriber-level access upload malicious ZIP archives to write arbitrary files, including executable PHP, leading to remote code execution.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 22.7%(Probability of exploitation in next 30 days)

Impact

Authenticated attackers can upload malicious files to execute arbitrary code, potentially compromising the entire server.

Mitigation

Update to the latest version of Worry Proof Backup plugin.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Feb 26, 2026

🟠 CVE-2026-1311 - High (8.8) The Worry Proof Backup plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 0.2.4 via the backup upload functionality. This makes it possible for authenticated attackers, with Subscriber-level access and above... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-1311/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-1311
Severity
High
CVSS Score
8.8
Type
path_traversal
Status
unconfirmed
EPSS
22.7%
Social Posts
1

CWE

  • CWE-22

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS Score

22.7%Probability of exploitation in the next 30 days