EZ Backup Security & Risk Analysis

wordpress.org/plugins/ez-backup

Keep your database safe with scheduled backups. Multiple option for off-site backups also available.

10 active installs v4.15.12 PHP + WP 2.6+ Updated Mar 13, 2015
crondbeasymysqlsql
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EZ Backup Safe to Use in 2026?

Generally Safe

Score 85/100

EZ Backup has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "ez-backup" plugin v4.15.12 exhibits a mixed security posture. On the positive side, it demonstrates good practices by using prepared statements for all SQL queries and generally implementing capability checks for its operations. The absence of known CVEs and a clean vulnerability history are also strong indicators of a relatively secure plugin over time. However, the static analysis reveals significant areas of concern.

The plugin utilizes the dangerous `passthru` function four times, which can be a vector for command injection if not handled with extreme care and robust sanitization. Furthermore, the taint analysis indicates two flows with unsanitized paths, flagged as critical severity. This is a major red flag, suggesting that user-supplied data could be used to construct file paths or commands without proper validation, potentially leading to unauthorized file access or arbitrary code execution.

While the attack surface appears minimal with no directly exposed AJAX handlers, REST API routes, or shortcodes, the internal code signals, particularly the `passthru` usage and unsanitized paths, present a substantial risk. The low percentage of properly escaped output also suggests a potential for cross-site scripting (XSS) vulnerabilities, although no specific flows were highlighted as critical in the taint analysis for this. The presence of multiple file operations without explicit mention of sanitization in the taint analysis further amplifies these concerns.

Key Concerns

  • Critical taint flows with unsanitized paths
  • Usage of dangerous function: passthru
  • Low percentage of properly escaped output
  • File operations without clear sanitization in taint analysis
Vulnerabilities
None known

EZ Backup Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

EZ Backup Code Analysis

Dangerous Functions
4
Raw SQL Queries
0
5 prepared
Unescaped Output
15
3 escaped
Nonce Checks
1
Capability Checks
3
File Operations
21
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

passthrupassthru($backup_command.'"'.$backup_file.'"', $errors);index.php:151
passthrupassthru('gunzip -c "'.trailingslashit($GLOBALS["ez-backup"]["settings"]['backup_dir']).$_REQUEST["eindex.php:550
passthrupassthru($backup_command.' -e "source '.trailingslashit($GLOBALS["ez-backup"]["settings"]['backup_diindex.php:559
passthrupassthru($backup_command.' -e "source '.trailingslashit($GLOBALS["ez-backup"]["settings"]['backup_diindex.php:583

SQL Query Safety

100% prepared5 total queries

Output Escaping

17% escaped18 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
ezbackup_menu (index.php:306)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

EZ Backup Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionezbackup_db_dailyindex.php:234
actionezbackup_db_hourlyindex.php:235
actionadmin_noticesindex.php:275
actionwp_enqueue_scriptsindex.php:304
actionadmin_menuindex.php:317
filterplugin_action_linksindex.php:324
filterplugin_row_metaindex.php:331

Scheduled Events 4

ezbackup_db_daily
ezbackup_db_hourly
ezbackup_db_daily
ezbackup_db_hourly
Maintenance & Trust

EZ Backup Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedMar 13, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

EZ Backup Developer Profile

Eli

9 plugins · 101K total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
782 days
View full developer profile
Detection Fingerprints

How We Detect EZ Backup

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ez-backup/ez-backup.css/wp-content/plugins/ez-backup/ez-backup.js
Script Paths
/wp-content/plugins/ez-backup/ez-backup.js
Version Parameters
ez-backup/ez-backup.css?ver=ez-backup/ez-backup.js?ver=

HTML / DOM Fingerprints

CSS Classes
ez-backup-wrapez-backup-settingsez-backup-footer
HTML Comments
EZ Backup Main Plugin FileCopyrightThis program is free software; you can redistribute itThis program is distributed in the hope that it will be useful+3 more
Data Attributes
data-ez-backup-nonce
JS Globals
ez_backup_params
FAQ

Frequently Asked Questions about EZ Backup