Civic Job Posting Security & Risk Analysis

wordpress.org/plugins/civic-job-posting

Civic Job Posting offers a mechanism to easily handle the medatadata of your job postings in order for them to appear in the special Job section of Go …

10 active installs v1.2.0 PHP + WP 3.0.1+ Updated Nov 15, 2019
google-search-jobsjob-postingjobs
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Civic Job Posting Safe to Use in 2026?

Generally Safe

Score 85/100

Civic Job Posting has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The civic-job-posting plugin v1.2.0 exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events, especially without authentication checks, significantly limits the attack surface. Furthermore, the plugin utilizes prepared statements for all SQL queries, which is a critical security practice. The high percentage of properly escaped output also suggests good defensive programming against cross-site scripting vulnerabilities. The lack of recorded vulnerabilities in its history indicates a history of responsible development and maintenance.

However, several areas warrant attention. The presence of two flows with unsanitized paths in the taint analysis, even without critical or high severity, is a concern. While the analysis did not flag them as critical, such flows can sometimes be leveraged for path traversal or file inclusion vulnerabilities. The absence of nonce checks and capability checks is another significant weakness. This means that actions, if they exist and are triggered through other means, might not be properly authorized or protected against replay attacks. The bundled Guzzle library, while common, could be a point of concern if it is an outdated version or has known vulnerabilities, though this is not explicitly stated in the provided data.

In conclusion, the plugin has a solid foundation with a small attack surface and good SQL practices. The primary risks stem from potential path manipulation issues highlighted in the taint analysis and the notable absence of nonce and capability checks. The vulnerability history is positive, but the static analysis reveals areas that require further investigation and potential remediation to ensure robust security.

Key Concerns

  • Unsanitized paths found in taint analysis
  • Missing nonce checks
  • Missing capability checks
  • Bundled library (Guzzle) - potential version risk
Vulnerabilities
None known

Civic Job Posting Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Civic Job Posting Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
159 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle

Output Escaping

93% escaped171 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
cjp_admin_notices (admin\class-civic-job-posting-admin.php:689)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Civic Job Posting Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 26
filterredirect_post_locationadmin\class-civic-job-posting-admin.php:649
filterredirect_post_locationadmin\class-civic-job-posting-admin.php:655
filterredirect_post_locationadmin\class-civic-job-posting-admin.php:661
filterredirect_post_locationadmin\class-civic-job-posting-admin.php:733
filterredirect_post_locationadmin\class-civic-job-posting-admin.php:738
actioninitadmin\partials\civic-job-posting-cpt.php:80
actionplugins_loadedincludes\class-civic-job-posting.php:151
actionadmin_enqueue_scriptsincludes\class-civic-job-posting.php:167
actionadmin_enqueue_scriptsincludes\class-civic-job-posting.php:168
actionadmin_menuincludes\class-civic-job-posting.php:171
actionadmin_initincludes\class-civic-job-posting.php:176
actionadd_meta_boxesincludes\class-civic-job-posting.php:178
actionsave_postincludes\class-civic-job-posting.php:179
actionsave_postincludes\class-civic-job-posting.php:180
filterrest_prepare_civic-job-postingincludes\class-civic-job-posting.php:181
actionwp_headincludes\class-civic-job-posting.php:183
actionedit_form_advancedincludes\class-civic-job-posting.php:184
actionpublish_civic-job-postingincludes\class-civic-job-posting.php:190
actiondraft_civic-job-postingincludes\class-civic-job-posting.php:191
actionpending_civic-job-postingincludes\class-civic-job-posting.php:192
actionauto-draft_civic-job-postingincludes\class-civic-job-posting.php:193
actionprivate_civic-job-postingincludes\class-civic-job-posting.php:194
actiontrash_civic-job-postingincludes\class-civic-job-posting.php:195
actionadmin_noticesincludes\class-civic-job-posting.php:196
actionwp_enqueue_scriptsincludes\class-civic-job-posting.php:213
filtertemplate_includeincludes\class-civic-job-posting.php:215
Maintenance & Trust

Civic Job Posting Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedNov 15, 2019
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Civic Job Posting Developer Profile

Tasos Fel

2 plugins · 2K total installs

82
trust score
Avg Security Score
92/100
Avg Patch Time
49 days
View full developer profile
Detection Fingerprints

How We Detect Civic Job Posting

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/civic-job-posting/css/civic-job-posting-admin.css/wp-content/plugins/civic-job-posting/js/civic-job-posting-admin.js
Version Parameters
civic-job-posting-admin.css?ver=civic-job-posting-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
cjp-required-fieldscjp-optional-fields
Data Attributes
data-cjp-input-type
FAQ

Frequently Asked Questions about Civic Job Posting