backupvulnerabilitiesCVEsecurity-auditmigrationfile-uploadauthentication-bypass

The 10 Most Vulnerable WordPress Backup Plugins: A 2026 Security Audit

WP-Safety Team
|
March 16, 2026
|
6 min read

Backup plugins occupy one of the most privileged positions in the WordPress ecosystem. By design, they need deep access to your files, database, and server — which makes them prime targets when vulnerabilities creep in. An attacker who exploits a flaw in your backup plugin doesn't just read a comment or redirect a link; they can exfiltrate your entire database, overwrite core files, or take over your site completely.

We queried the WP-Safety vulnerability database — ranked by total CVE count — and pulled detailed records on every plugin in the top 10. What follows is a data-driven audit of the backup plugins most in need of your attention, complete with real CVSS scores, vulnerability types, and patch timelines. All plugins on this list are currently fully patched, but their historical track records reveal patterns every site owner should understand.


⚠️ Audit Prompt: If any of the plugins below are installed on your site, check that you are running the latest version. Every CVE listed here has a patched version — there is no excuse to run anything older.


The Ranked List at a Glance

RankPluginCVEsSecurity ScoreActive InstallsLast Vuln
#1WPvivid Backup & Migration2675/100900,000Feb 2026
#2Jetpack2487/1003,000,000Dec 2024
#3XCloner1676/10010,000Dec 2025
#4Duplicator1587/1001,000,000Jul 2024
#5InstaWP Connect1576/10030,000Dec 2025
#6UpdraftPlus1490/1003,000,000Jan 2025
#7All-in-One WP Migration1390/1005,000,000Aug 2025
#8WP Database Backup1387/10030,000Jan 2025
#9Backup Migration1277/100100,000Nov 2025
#10BackWPup1083/100500,000Feb 2026

Deep Dives: Plugin-by-Plugin CVE Analysis

#1 — WPvivid: Backup, Migration & Staging

WPvivid — Backup, Migration & Staging

MetricValue
Active Installs900,000
Total CVEs26
Unpatched CVEs0
Security Score75 / 100
Most Recent VulnFebruary 10, 2026

WPvivid tops this list by a significant margin — 26 CVEs recorded and a security score of just 75/100 — and it earned its place with a frightening CVSS 9.8 critical vulnerability disclosed as recently as February 2026. That flaw (affecting versions ≤ 0.9.123) allowed unauthenticated arbitrary file upload, meaning any anonymous visitor on the internet could upload a malicious PHP shell and achieve full remote code execution — no account required.

5 Most Recent Vulnerabilities:

SeverityTitleCVSSTypePatched In
🔴 CriticalUnauthenticated Arbitrary File Upload9.8Unrestricted File Upload0.9.124
🟢 LowAuthenticated (Admin+) Arbitrary Directory Creation2.7External Control of File Path0.9.121
🟠 HighAuthenticated (Admin+) Arbitrary File Upload7.2Unrestricted File Upload0.9.117
🟠 HighArbitrary File Upload via wpvivid_upload_file7.2Unrestricted File Upload0.9.113
🟡 MediumMissing Authorization5.3Missing Authorization0.9.107

The Pattern: WPvivid has a deeply recurring problem with file upload controls. Four of its five most recent CVEs involve some variant of unrestricted file upload or path manipulation. This is not a one-off coding mistake — it reflects a systemic gap in how the plugin validates and sanitizes upload operations. The February 2026 critical flaw is particularly alarming because it required zero authentication, placing all 900,000 active sites at immediate risk until patching.

Verdict: High-volume installs + lowest security score on the list + a pattern of critical unauthenticated vulnerabilities = the highest-priority plugin to audit today. Ensure you are on version 0.9.124 or later.


#2 — Jetpack – WP Security, Backup, Speed, & Growth

Jetpack – WP Security, Backup, Speed, & Growth

MetricValue
Active Installs3,000,000
Total CVEs24
Unpatched CVEs0
Security Score87 / 100
Most Recent VulnDecember 4, 2024

Jetpack lands at #2 with 24 CVEs and an exposure footprint of 3 million active sites — making the raw scale of risk here larger than nearly any other plugin on the web. To Automattic's credit, the security score holds at 87/100 and all issues have been patched, but the sheer breadth of functionality (backup, WAF, CDN, social, stats) means a proportionally large attack surface.

5 Most Recent Vulnerabilities:

SeverityTitleCVSSTypePatched In
🟡 MediumReflected DOM-based Cross-Site Scripting (v13.0–14.0)6.1XSS14.1
🟡 MediumUnauthenticated Arbitrary Block & Shortcode Execution6.5Authorization Bypass13.8
🟡 MediumMissing Authorization → Sensitive Information Disclosure4.3Missing Authorization10.0.2
🟡 MediumContributor+ Stored XSS via wpvideo Shortcode6.4Stored XSS13.4
🟡 MediumContributor+ Stored XSS via Block Attribute6.4Stored XSS12.8-a.3

The Pattern: Jetpack's recent CVE history clusters firmly in the medium severity band — a sign of a mature security response process catching issues before they become critical. The most concerning recent entry is the unauthenticated shortcode/block execution bug (CVSS 6.5), which could allow anonymous visitors to trigger arbitrary WordPress actions. The cluster of Contributor-level XSS vulnerabilities is also a reminder that even low-trust authenticated roles can be weaponized.

Verdict: Jetpack's high install count demands vigilance. The good news is its 87/100 score and rapid patch cadence reflect a vendor that takes security seriously. Keep auto-updates enabled and stay on the latest release.


#3 — XCloner: Backup, Restore and Migrate

Backup, Restore and Migrate your sites with XCloner

MetricValue
Active Installs10,000
Total CVEs16
Unpatched CVEs0
Security Score76 / 100
Most Recent VulnDecember 4, 2025

XCloner is a smaller plugin by install count — just 10,000 sites — but its security score of 76/100 and 16 CVEs paint a troubling picture for the users who rely on it. Its vulnerability history stretches back to critical CSRF and authorization bypass issues that previously scored a perfect 9.8.

5 Most Recent Vulnerabilities:

SeverityTitleCVSSTypePatched In
🟡 MediumCSRF in Xcloner_Remote_Storage::save()4.3CSRF4.8.3
🟡 MediumUnauthenticated Full Path Disclosure5.3Information Exposure4.7.4
🔴 CriticalUnauthenticated Plugin Settings Reset9.8Missing Authorization4.3.6
🟠 HighUnprotected AJAX Actions8.8Missing Authorization4.2.153
🔴 CriticalCross-Site Request Forgery (Full Impact)9.8CSRF4.2.153

The Pattern: XCloner has historically suffered from catastrophic authorization failures — two separate CVSS 9.8 vulnerabilities, plus an 8.8 AJAX exposure, all rooted in the same root cause: inadequate access controls on sensitive plugin actions. While recent CVEs are less severe, the low security score suggests the codebase still warrants scrutiny.

Verdict: Given its small user base, XCloner lacks the community pressure that forces rapid security improvements in larger plugins. If you're using it, seriously evaluate whether a more actively maintained alternative better serves your needs.


#4 — Duplicator: Backups & Migration Plugin

Duplicator – Backups & Migration Plugin

MetricValue
Active Installs1,000,000
Total CVEs15
Unpatched CVEs0
Security Score87 / 100
Most Recent VulnJuly 10, 2024

Duplicator is a beloved migration tool with 1 million installs, but it carries 15 CVEs and two documented instances of CVSS 9.8 critical vulnerabilities — including an unauthenticated remote code execution (RCE) flaw that is among the most dangerous vulnerability classes in existence.

5 Most Recent Vulnerabilities:

SeverityTitleCVSSTypePatched In
🟡 MediumFull Path Disclosure5.3Information Exposure1.5.10
🟡 MediumCSRF via diagnostics/information.php4.3CSRF1.5.7.1
🔴 CriticalUnauthenticated Remote Code Execution9.8Code Injection1.3.0
🔴 CriticalUnauthenticated Sensitive Information Exposure9.8Information Exposure1.5.7.1
🟠 HighSensitive Information Disclosure7.5Information Exposure1.4.7.1

The Pattern: Duplicator has a recurrent theme of information exposure — backup packages and sensitive configuration data leaking to unauthenticated users. The installer workflow, which by design leaves a installer.php file accessible, has historically been a significant attack vector. The archived unauthenticated RCE (pre-1.3.0) is a textbook example of why you should never leave old installer files on a production server.

Verdict: Duplicator has improved markedly (87/100 score) and no vulnerabilities have been disclosed since July 2024. Always delete installer files immediately after migration and keep the plugin current.


#5 — InstaWP Connect: 1-click WP Staging & Migration

InstaWP Connect – 1-click WP Staging & Migration

MetricValue
Active Installs30,000
Total CVEs15
Unpatched CVEs0
Security Score76 / 100
Most Recent VulnDecember 12, 2025

InstaWP Connect is alarming precisely because it is a newer plugin that has already accumulated 15 CVEs — including three CVSS 9.8 or 8.8 flaws disclosed in early 2025 alone. The velocity of critical vulnerabilities in a short window is a major red flag.

5 Most Recent Vulnerabilities:

SeverityTitleCVSSTypePatched In
🟡 MediumMissing Authorization5.3Missing Authorization0.1.2.0
🟠 HighUnauthenticated Local PHP File Inclusion8.1Path Traversal0.1.0.86
🔴 CriticalUnauthenticated Local File Inclusion9.8PHP File Inclusion0.1.0.83
🟠 HighCSRF to Local File Inclusion8.8CSRF + LFI0.1.0.84
🔴 CriticalAuthentication Bypass to Admin9.8Auth Bypass0.1.0.45

The Pattern: Local File Inclusion (LFI) vulnerabilities appear twice in five CVEs, and an authentication bypass to admin flaw (CVSS 9.8) means attackers could gain full administrative access without any credentials. This combination — auth bypass plus file inclusion — represents some of the most dangerous primitives in web application security. The frequency of patching (multiple patch versions issued within days of each other in March 2025) suggests the codebase was under active exploitation pressure.

Verdict: InstaWP's 76/100 score and velocity of critical CVEs makes it the highest-risk plugin per unit of install base on this list. Monitor its changelog obsessively and consider deactivating it on production sites when not actively in use.