
EZ Backup Security & Risk Analysis
wordpress.org/plugins/ez-backupKeep your database safe with scheduled backups. Multiple option for off-site backups also available.
Is EZ Backup Safe to Use in 2026?
Generally Safe
Score 85/100EZ Backup has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "ez-backup" plugin v4.15.12 exhibits a mixed security posture. On the positive side, it demonstrates good practices by using prepared statements for all SQL queries and generally implementing capability checks for its operations. The absence of known CVEs and a clean vulnerability history are also strong indicators of a relatively secure plugin over time. However, the static analysis reveals significant areas of concern.
The plugin utilizes the dangerous `passthru` function four times, which can be a vector for command injection if not handled with extreme care and robust sanitization. Furthermore, the taint analysis indicates two flows with unsanitized paths, flagged as critical severity. This is a major red flag, suggesting that user-supplied data could be used to construct file paths or commands without proper validation, potentially leading to unauthorized file access or arbitrary code execution.
While the attack surface appears minimal with no directly exposed AJAX handlers, REST API routes, or shortcodes, the internal code signals, particularly the `passthru` usage and unsanitized paths, present a substantial risk. The low percentage of properly escaped output also suggests a potential for cross-site scripting (XSS) vulnerabilities, although no specific flows were highlighted as critical in the taint analysis for this. The presence of multiple file operations without explicit mention of sanitization in the taint analysis further amplifies these concerns.
Key Concerns
- Critical taint flows with unsanitized paths
- Usage of dangerous function: passthru
- Low percentage of properly escaped output
- File operations without clear sanitization in taint analysis
EZ Backup Security Vulnerabilities
EZ Backup Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
EZ Backup Attack Surface
WordPress Hooks 7
Scheduled Events 4
Maintenance & Trust
EZ Backup Maintenance & Trust
Maintenance Signals
Community Trust
EZ Backup Alternatives
Database Manager – WP Adminer
pexlechris-adminer
Manage the database from your WordPress Dashboard using Adminer.
SQL Executioner
sql-executioner
Execute arbitrary SQL queries against your WordPress database from the Admin.
Secure DB Connection
secure-db-connection
Sets SSL keys and certs for encrypted MySQL database connections.
Database Read Replicas
database-read-replicas
BETA: Extend WordPress with MySQL database read replica support for greater speed and scalability
MySQList
mysqlist
Mit MySQList kann man ganz einfach Listen mit Ablaufdatum und Verlinkungen erstellen.
EZ Backup Developer Profile
9 plugins · 101K total installs
How We Detect EZ Backup
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/ez-backup/ez-backup.css/wp-content/plugins/ez-backup/ez-backup.js/wp-content/plugins/ez-backup/ez-backup.jsez-backup/ez-backup.css?ver=ez-backup/ez-backup.js?ver=HTML / DOM Fingerprints
ez-backup-wrapez-backup-settingsez-backup-footerEZ Backup Main Plugin FileCopyrightThis program is free software; you can redistribute itThis program is distributed in the hope that it will be useful+3 moredata-ez-backup-nonceez_backup_params