CVE-2026-4030: WordPress Plugin Exposes Multisite Files to Unauthenticated Attackers
The National Vulnerability Database has detailed CVE-2026-4030, a critical flaw in the Database Backup for WordPress plugin affecting all versions up to 2.5.2. This vulnerability allows unauthenticated attackers to read and delete arbitrary files on the server. The root cause is an inadequate authorization check combined with a user-controlled backup directory parameter, leading to sensitive information exposure and potential site takeover.
Critically, this high-severity vulnerability (CVSS 8.1) is only exploitable in WordPress Multisite environments that still utilize the deprecated is_site_admin() function. While this narrows the attack surface, it doesn’t diminish the impact for affected organizations. Attackers can leverage this to exfiltrate sensitive data or disrupt operations by deleting critical files.
This isn’t just about data exposure; it’s about control. An attacker gaining arbitrary file read and delete capabilities can effectively dismantle a site or steal credentials, setting the stage for further compromise. Defenders need to recognize that even deprecated functions can be critical attack vectors if not properly retired or secured.
What This Means For You
- If your organization runs WordPress Multisite, especially with the Database Backup for WordPress plugin, you need to act immediately. Verify if the `is_site_admin()` function is still in use. If it is, and you're running any version of the plugin up to 2.5.2, you are vulnerable. Prioritize patching or disabling the plugin until a fix is available, and audit your server logs for any suspicious file access or deletion attempts.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-4030: WordPress Database Backup Plugin Arbitrary File Read
title: CVE-2026-4030: WordPress Database Backup Plugin Arbitrary File Read
id: scw-2026-05-14-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-4030 by targeting the 'backup_backup_download' action in the WordPress Database Backup plugin via admin-ajax.php. This specific URI query pattern is indicative of an unauthenticated attacker attempting to read arbitrary files from a WordPress Multisite environment.
author: SCW Feed Engine (AI-generated)
date: 2026-05-14
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-4030/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/wp-admin/admin-ajax.php'
cs-uri-query|contains:
- 'action=backup_backup_download'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-4030 | Information Disclosure | Database Backup for WordPress plugin <= 2.5.2 |
| CVE-2026-4030 | Path Traversal | Database Backup for WordPress plugin <= 2.5.2 - arbitrary file read |
| CVE-2026-4030 | Auth Bypass | Database Backup for WordPress plugin <= 2.5.2 - improper authorization check |
| CVE-2026-4030 | Arbitrary File Deletion | Database Backup for WordPress plugin <= 2.5.2 - arbitrary file deletion |
| CVE-2026-4030 | Misconfiguration | WordPress Multisite environments with deprecated is_site_admin() function |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 14, 2026 at 16:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.