Luzid Backup to Nextcloud Security & Risk Analysis

wordpress.org/plugins/luzid-backup-to-nextcloud

Upload WordPress backup files to Nextcloud via WebDAV, with optional rotation and retention management.

0 active installs v1.2.10 PHP 7.4+ WP 5.8+ Updated Mar 13, 2026
backupcronnextcloudrotationwebdav
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Luzid Backup to Nextcloud Safe to Use in 2026?

Generally Safe

Score 100/100

Luzid Backup to Nextcloud has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 23d ago
Risk Assessment

The luzid-backup-to-nextcloud plugin, version 1.2.10, demonstrates a strong security posture in several key areas. The static analysis reveals a complete absence of dangerous functions, 100% of SQL queries are handled with prepared statements, and all output is properly escaped. Furthermore, all identified entry points (AJAX handlers and cron events) are protected by nonce and capability checks, indicating good security practices for handling user-initiated actions and scheduled tasks.

Despite these strengths, the taint analysis identified two flows with unsanitized paths. While categorized as not critical or high severity, unsanitized paths can still pose risks if they lead to directory traversal or other file system manipulation vulnerabilities, especially when combined with file operations. The plugin also performs external HTTP requests, which can be a vector for further attacks if the target endpoints are compromised or if the plugin doesn't properly validate responses.

Historically, the plugin has no recorded vulnerabilities, which is a significant positive indicator. This lack of known CVEs suggests a proactive approach to security or a fortunate absence of exploitable flaws. Overall, the plugin exhibits robust security practices, particularly in its handling of database queries and output sanitization. However, the presence of unsanitized paths in the taint analysis warrants careful attention and potential remediation to mitigate any latent file system risks.

Key Concerns

  • Flows with unsanitized paths found in taint analysis
  • Plugin performs external HTTP requests
Vulnerabilities
None known

Luzid Backup to Nextcloud Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Luzid Backup to Nextcloud Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
244 escaped
Nonce Checks
7
Capability Checks
6
File Operations
1
External Requests
5
Bundled Libraries
0

Output Escaping

100% escaped244 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
save_and_test_connection (luzid-backup-to-nextcloud.php:772)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Luzid Backup to Nextcloud Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_luzid_backup_get_progressluzid-backup-to-nextcloud.php:52
authwp_ajax_luzid_backup_run_uploadluzid-backup-to-nextcloud.php:53
WordPress Hooks 8
actionadmin_menuluzid-backup-to-nextcloud.php:45
actionadmin_enqueue_scriptsluzid-backup-to-nextcloud.php:46
actionadmin_initluzid-backup-to-nextcloud.php:47
actionadmin_post_luzid_backup_save_and_testluzid-backup-to-nextcloud.php:48
actionadmin_post_luzid_backup_manual_runluzid-backup-to-nextcloud.php:49
actionadmin_post_luzid_backup_delete_allluzid-backup-to-nextcloud.php:50
actionadmin_post_luzid_backup_clear_logsluzid-backup-to-nextcloud.php:51
actionluzid_backup_cron_hookluzid-backup-to-nextcloud.php:56

Scheduled Events 1

luzid_backup_cron_hook
Maintenance & Trust

Luzid Backup to Nextcloud Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 13, 2026
PHP min version7.4
Downloads174

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Luzid Backup to Nextcloud Developer Profile

luzidmedia

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Luzid Backup to Nextcloud

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/luzid-backup-to-nextcloud/assets/css/luzid.css/wp-content/plugins/luzid-backup-to-nextcloud/assets/js/luzid.js
Script Paths
/wp-content/plugins/luzid-backup-to-nextcloud/assets/js/luzid.js
Version Parameters
luzid-backup-to-nextcloud/assets/css/luzid.css?ver=luzid-backup-to-nextcloud/assets/js/luzid.js?ver=

HTML / DOM Fingerprints

CSS Classes
luzid-backup-formlcs-tab-link
HTML Comments
<!-- Track active tab --><!-- phpcs:ignore WordPress.Security.NonceVerification.Recommended --><!-- Display flag only, no processing -->
Data Attributes
data-tabid="active-tab-input"id="upload-modal"id="upload-wait-message"id="upload-progress"id="upload-status"+5 more
JS Globals
luzid_backup_dataluzidCloseModalluzidCloseUploadModalluzidSaveAndTestluzidStartUpload
REST Endpoints
/wp-json/luzid-backup-to-nextcloud
FAQ

Frequently Asked Questions about Luzid Backup to Nextcloud