GW Database Backup Security & Risk Analysis

wordpress.org/plugins/gw-database-backup

GW Database Backup manages backup & restoring of your database efficiently.

0 active installs v1.0.0 PHP 5.6+ WP 4.4+ Updated May 5, 2020
backupdatabase-backupdb-backupgw-db-backupwordpress-database-backup
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is GW Database Backup Safe to Use in 2026?

Generally Safe

Score 85/100

GW Database Backup has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "gw-database-backup" plugin v1.0.0 exhibits a generally good security posture with several strong practices in place. Notably, all identified SQL queries utilize prepared statements, which is a critical defense against SQL injection vulnerabilities. The plugin also incorporates nonce checks and capability checks for its entry points, further limiting unauthorized access. The absence of known CVEs and historical vulnerabilities is a positive indicator of past security diligence or a lack of prior exploitation.

However, the static analysis does reveal potential areas of concern. The presence of "dangerous functions" like `ini_set` and `set_time_limit` could be misused if not handled with proper input validation, although their presence alone doesn't guarantee a vulnerability. More significantly, the taint analysis indicates two flows with unsanitized paths. While the severity is not classified as high or critical, unsanitized paths are a direct indicator of potential vulnerabilities related to file operations or arbitrary path manipulation, especially when combined with the seven file operations present in the code. Furthermore, the output escaping rate of only 21% is alarmingly low, suggesting a high risk of Cross-Site Scripting (XSS) vulnerabilities when user-controlled data is displayed without proper sanitization.

In conclusion, while the plugin has a solid foundation regarding SQL injection and access control, the low output escaping rate and the presence of unsanitized paths in the taint analysis represent significant risks that need immediate attention. The lack of historical vulnerabilities is encouraging but does not negate the immediate findings from the code analysis. Addressing the identified taint flows and improving output escaping should be the priority.

Key Concerns

  • Unsanitized paths in taint analysis
  • Low output escaping rate (21%)
  • Use of dangerous functions (ini_set, set_time_limit)
Vulnerabilities
None known

GW Database Backup Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

GW Database Backup Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

GW Database Backup Code Analysis

Dangerous Functions
4
Raw SQL Queries
0
3 prepared
Unescaped Output
23
6 escaped
Nonce Checks
2
Capability Checks
1
File Operations
7
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

ini_setini_set("max_execution_time", "4000");inc/class-gwdbbackup.php:148
ini_setini_set("max_input_time", "4000");inc/class-gwdbbackup.php:149
ini_setini_set('memory_limit', '900M');inc/class-gwdbbackup.php:150
set_time_limitset_time_limit(0);inc/class-gwdbbackup.php:151

SQL Query Safety

100% prepared3 total queries

Output Escaping

21% escaped29 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
execution (inc/class-gwdbbackup.php:75)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

GW Database Backup Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_update_settinginc/class-gwdbbackupsettings.php:26
WordPress Hooks 5
actionadmin_noticesgw-database-backup.php:44
actionadmin_enqueue_scriptsinc/class-gwdbbackup.php:35
actionadmin_initinc/class-gwdbbackup.php:37
actionadmin_menuinc/class-gwdbbackupsettings.php:24
actionadmin_initinc/class-gwdbbackupsettings.php:25
Maintenance & Trust

GW Database Backup Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMay 5, 2020
PHP min version5.6
Downloads988

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

GW Database Backup Developer Profile

M A Monim

2 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GW Database Backup

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gw-database-backup/css/admin.css/wp-content/plugins/gw-database-backup/css/bootstrap.min.css/wp-content/plugins/gw-database-backup/js/admin.js
Script Paths
/wp-content/plugins/gw-database-backup/js/admin.js
Version Parameters
gw-database-backup/css/admin.css?ver=gw-database-backup/css/bootstrap.min.css?ver=gw-database-backup/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
gwdb_wrap
HTML Comments
<!-- Core class --><!-- version string --><!-- filepath string --><!-- GWBackup constructor. -->+7 more
Data Attributes
data-toggle="modal"data-target="#gwdb-modal"
JS Globals
gwdb_backup_path
FAQ

Frequently Asked Questions about GW Database Backup