The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-1311

CVE-2026-1311: WordPress Worry Proof Backup Path Traversal

CVE-2026-1311 is a path traversal vulnerability in the Worry Proof Backup plugin for WordPress, allowing authenticated attackers to upload malicious files and execute code. This article covers technical details, affected versions, and mitigation.

Published: February 27, 2026

CVE-2026-1311 Overview

The Worry Proof Backup plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 0.2.4 via the backup upload functionality. This vulnerability allows authenticated attackers with Subscriber-level access or higher to upload a malicious ZIP archive containing path traversal sequences. Successful exploitation enables arbitrary file writes anywhere on the server, including executable PHP files, ultimately leading to remote code execution.

Critical Impact

Authenticated attackers with minimal privileges (Subscriber-level) can achieve complete server compromise through arbitrary file upload and remote code execution.

Affected Products

  • Worry Proof Backup WordPress Plugin versions ≤ 0.2.4
  • WordPress installations with the Worry Proof Backup plugin enabled
  • Servers hosting WordPress with subscriber-level user registration enabled

Discovery Timeline

  • 2026-02-26 - CVE-2026-1311 published to NVD
  • 2026-02-26 - Last updated in NVD database

Technical Details for CVE-2026-1311

Vulnerability Analysis

This vulnerability is classified as CWE-22 (Path Traversal), which occurs when the application fails to properly sanitize user-supplied input that is used to construct file paths. In the context of the Worry Proof Backup plugin, the backup upload functionality does not adequately validate the file paths within uploaded ZIP archives before extraction.

The vulnerability is exploitable over the network and requires only low-privilege authentication (Subscriber-level access). Once exploited, an attacker gains the ability to write arbitrary files to any location on the server filesystem accessible by the web server process, resulting in complete compromise of confidentiality, integrity, and availability.

Root Cause

The root cause lies in the upload-backup.php file located at inc/libs/upload-backup.php (line 97). The backup upload handler processes ZIP archives without properly sanitizing or validating the file paths contained within the archive. When extracting files, the plugin fails to check for path traversal sequences such as ../ within the ZIP archive's internal file paths, allowing attackers to escape the intended upload directory and write files to arbitrary locations on the server.

Attack Vector

The attack vector involves authenticated users exploiting the backup upload functionality through the following mechanism:

  1. An attacker authenticates to WordPress with at least Subscriber-level privileges
  2. The attacker crafts a malicious ZIP archive containing files with path traversal sequences in their filenames (e.g., ../../../wp-content/plugins/malicious.php)
  3. The attacker uploads the malicious ZIP archive through the plugin's backup upload interface
  4. The plugin extracts the archive without proper path validation
  5. Files are written outside the intended directory, potentially including executable PHP files in web-accessible locations
  6. The attacker accesses the uploaded PHP file to achieve remote code execution

The vulnerability in the backup upload functionality can be understood through the file extraction process. When the plugin extracts files from a user-uploaded ZIP archive, it fails to validate that the target path remains within the intended backup directory. Path traversal sequences like ../ within the ZIP archive's internal file paths allow attackers to write files to arbitrary locations. For technical details, see the WordPress Plugin File Reference and the Wordfence Vulnerability Report.

Detection Methods for CVE-2026-1311

Indicators of Compromise

  • Unexpected PHP files appearing in web-accessible directories outside the plugin's backup folder
  • Web server logs showing access to newly created PHP files not part of the standard WordPress installation
  • ZIP file uploads through the Worry Proof Backup plugin from low-privilege user accounts
  • File system changes in directories outside the expected backup storage location

Detection Strategies

  • Monitor file creation events in WordPress directories, especially wp-content, wp-includes, and the web root for unexpected PHP files
  • Implement web application firewall (WAF) rules to detect and block ZIP uploads containing path traversal sequences
  • Review web server access logs for suspicious requests to the backup upload endpoint from subscriber-level accounts
  • Deploy file integrity monitoring to detect unauthorized file modifications or creations

Monitoring Recommendations

  • Enable detailed logging for the Worry Proof Backup plugin's upload functionality
  • Configure SentinelOne's endpoint protection to monitor for suspicious PHP file creation events outside normal WordPress operations
  • Set up alerts for any file writes to sensitive WordPress directories by the web server process
  • Monitor authentication logs for unusual subscriber-level account activity related to backup operations

How to Mitigate CVE-2026-1311

Immediate Actions Required

  • Disable or remove the Worry Proof Backup plugin immediately if running version 0.2.4 or earlier
  • Audit the WordPress file system for any unexpected PHP files that may have been uploaded by attackers
  • Review user accounts with Subscriber-level or higher access for any suspicious activity
  • Temporarily disable user registration if not required for business operations
  • Implement web application firewall rules to block malicious ZIP uploads

Patch Information

At the time of publication, organizations should check for an updated version of the Worry Proof Backup plugin that addresses this vulnerability. Refer to the WordPress Plugin Repository for the latest version information. Until a patch is available, it is strongly recommended to disable or remove the plugin entirely.

Workarounds

  • Disable the Worry Proof Backup plugin until a patched version is released
  • Restrict subscriber-level user registration to minimize potential attack surface
  • Implement server-level file upload restrictions to prevent ZIP file uploads to the vulnerable endpoint
  • Configure PHP's open_basedir directive to limit file operations to specific directories
  • Deploy SentinelOne endpoint protection to detect and prevent malicious file creation activities
bash
# Disable the Worry Proof Backup plugin via WP-CLI
wp plugin deactivate worry-proof-backup

# Scan for recently modified PHP files in WordPress directories
find /var/www/html -name "*.php" -mtime -7 -type f -exec ls -la {} \;

# Review file permissions and restrict write access
chmod 755 /var/www/html/wp-content
chmod 644 /var/www/html/wp-content/*.php

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePath Traversal

  • Vendor/TechWordpress

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability0.23%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-22
  • Technical References
  • WordPress Plugin File Reference

  • WordPress Plugin File Reference

  • Wordfence Vulnerability Report
  • Related CVEs
  • CVE-2026-3243: Advanced Members ACF Path Traversal Flaw

  • CVE-2026-5436: MW WP Form Path Traversal Vulnerability

  • CVE-2024-4346: Startklar Elementor Path Traversal Flaw

  • CVE-2026-3666: wpForo Forum Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English