Vulnerability Report
Plugin High Patch path listed

WordPress Backup and Migrate Plugin – Backup Guard < 1.0.3 - Arbitrary File Upload

The WordPress Backup and Migrate Plugin – Backup Guard plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the backup_guard_get_import_backup() function in versions up to, and including, 1.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to upload arbitrary files on the affected sites server which may make remote code execution possible.

Quick Answer

This vulnerability is a high severity with CVSS 8.8 Remote Code Execution issue affecting the Plugin JetBackup – Backup, Restore & Migrate. It affects Versions before 1.0.3 and is fixed in 1.0.3.

Published
Feb 15, 2016
Last Updated
Jan 22, 2024
Slug
backup
Operational Summary

What the operator needs to know

Patch Status
Patched release is available
Remediation
Update to version 1.0.3, or a newer patched version
Operator Briefing

the tracked vulnerability is tracked for the Plugin JetBackup – Backup, Restore & Migrate as high severity with CVSS 8.8. The affected range is Versions before 1.0.3. Update JetBackup – Backup, Restore & Migrate to 1.0.3 or newer where that version is compatible with the site.

Issue Type
Remote Code Execution
Primary Fixed Version
1.0.3
Primary Affected Range
Versions before 1.0.3
Tracking ID
7ee267ff-b650-44a5-994b-3a22d34722e8
Detailed Metadata
Software Type Plugin
Software Slug
CVE No linked CVE entry.
Patched Versions
1.0.3
Affected Versions
Versions before 1.0.3
Related CVE Cluster

Related CVEs for JetBackup – Backup, Restore & Migrate

These internal links group the same WordPress plugin by CVE, issue type, severity, and patch status so operators and search engines can connect the full vulnerability cluster.

Critical CVE-2023-7165 2.0.9.9 Feb 02, 2024
CVE-2023-7165 JetBackup – Backup, Restore & Migrate Sensitive Information Exposure

JetBackup <= 2.0.9.7 - Sensitive Information Exposure via Directory Listing

High CVE-2020-36669 1.4.0 Jul 16, 2020
CVE-2020-36669 JetBackup – Backup, Restore & Migrate Arbitrary File Upload

JetBackup – WP Backup, Migrate & Restore <= 1.3.9 - Cross-Site Request Forgery to Arbitrary File Upload

High CVE-2021-24155 1.6.0 Feb 18, 2021
CVE-2021-24155 JetBackup – Backup, Restore & Migrate Arbitrary File Upload

Backup Guard <= 1.5.9 - Authenticated Arbitrary File Upload

Medium CVE-2017-10837 1.1.47 Aug 24, 2017
CVE-2017-10837 JetBackup – Backup, Restore & Migrate Cross-Site Scripting

BackupGuard <= 1.1.46 - Reflected Cross-Site Scripting

Medium CVE-2017-18488 1.1.47 Aug 11, 2017
CVE-2017-18488 JetBackup – Backup, Restore & Migrate Cross-Site Scripting

Backup Guard <= 1.1.46 - Cross-Site Scripting

Medium CVE-2022-34148 1.6.9.1 Oct 27, 2022
CVE-2022-34148 JetBackup – Backup, Restore & Migrate Stored Cross-Site Scripting

Backup Guard <= 1.6.9 - Authenticated (Administrator+) Stored Cross-Site Scripting

Medium CVE-2020-36667 1.4.1 Jul 30, 2020
CVE-2020-36667 JetBackup – Backup, Restore & Migrate Vulnerability

JetBackup – WP Backup, Migrate & Restore <= 1.4.1 - Missing Authorization to Unauthorized Backup Location Change

Medium CVE-2026-4853 3.1.20.3 Apr 16, 2026
CVE-2026-4853 JetBackup – Backup, Restore & Migrate File Upload

JetBackup <= 3.1.19.8 - Authenticated (Administrator+) Arbitrary Directory Deletion via Path Traversal in 'fileName' Parameter

Licensing Notices

This record contains material that is subject to copyright

DEFIANT
Copyright 2012-2026 Defiant Inc.

License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more