Report: Latest: CVE-2026-6227 - BackWPup <= 5.6.6 - authenticated (administrator+) local file inclusion via 'bloc...

Report: Latest: CVE-2026-6227 - BackWPup <= 5.6.6 - authenticated (administrator+) local file inclusion via 'bloc...

CVE ID :CVE-2026-6227 Published : April 14, 2026, 3:16 a.m. | 39 minutes ago Description :The BackWPup plugin for WordPress is vulnerable to Local File Inclusion via the `block_name` parameter of the `/wp-json/backwpup/v1/getblock` REST endpoint in all versions up to, and including, 5.6.6 due to a non-recursive `str_replace()` sanitization of path traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to include arbitrary PHP files on the server via crafted traversal sequences (e.g., `....//`), which can be leveraged to read sensitive files such as `wp-config.php` or achieve remote code execution in certain configurations. Administrators have the ability to grant individual users permission to handle backups, which may then allow lower-level users to exploit this vulnerability. Severity: 7.2 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
HIGH
Published
April 14, 2026
Affected Product: WordPress
Attack Vector: Local
Impact: path traversal