Civil Publisher Tools Security & Risk Analysis

wordpress.org/plugins/civil-publisher

Use Civil's growing suite of publisher tools, including: Boosts, to let readers easily support to your newsroom from any article; Credibility Ind …

0 active installs v1.0.0 PHP 7.0+ WP 4.6+ Updated Jan 14, 2020
blockchaincivilethereumjournalismnews
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Civil Publisher Tools Safe to Use in 2026?

Generally Safe

Score 85/100

Civil Publisher Tools has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "civil-publisher" v1.0.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events with exposed attack surfaces is a significant positive, indicating a limited scope for external exploitation. The code also demonstrates good practices with 100% of SQL queries utilizing prepared statements and a very high percentage of output escaping (98%), which greatly reduces the risk of common web vulnerabilities like SQL injection and Cross-Site Scripting (XSS).

However, a few areas warrant attention. The presence of one file operation, while not inherently insecure, represents a potential entry point that should be carefully scrutinized for any vulnerabilities. The static analysis also reveals a small number of nonce checks (4) and capability checks (13) relative to the total output count, which, while not indicative of outright missing checks on critical functions, could suggest opportunities for more robust access control in certain areas if the plugin were to expand its functionality. The complete absence of taint analysis results is not necessarily a negative, but it means that advanced, flow-based vulnerabilities may not have been detected or were not present. Crucially, the plugin has no recorded vulnerability history, which is an excellent sign of ongoing security consciousness from its developers, or simply that it hasn't been a target.

Overall, "civil-publisher" v1.0.0 appears to be a secure plugin with a minimal attack surface and good coding practices. The strengths far outweigh the minor potential concerns. The lack of historical vulnerabilities further bolsters confidence in its security. The primary recommendation would be to maintain this high standard as the plugin evolves.

Key Concerns

  • Single file operation present
  • Low count of capability checks relative to outputs
Vulnerabilities
None known

Civil Publisher Tools Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Civil Publisher Tools Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
118 escaped
Nonce Checks
4
Capability Checks
13
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

98% escaped121 total outputs
Attack Surface

Civil Publisher Tools Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 42
actionenqueue_block_editor_assetsadmin.php:29
actionadmin_menuadmin.php:79
actionadmin_menuadmin.php:91
actionadmin_noticesadmin.php:223
actionadmin_noticesadmin.php:262
actionadmin_noticesadmin.php:303
actionadmin_print_footer_scriptsadmin.php:369
actionadmin_initclasses\class-credibility-indicators.php:51
actionthe_contentclasses\class-credibility-indicators.php:52
actionadd_meta_boxesclasses\class-credibility-indicators.php:53
actionsave_postclasses\class-credibility-indicators.php:54
actioninitclasses\class-credibility-indicators.php:394
action_wp_put_post_revisionclasses\class-post-hashing.php:20
filterwp_save_post_revision_check_for_changesclasses\class-post-hashing.php:23
actiontransition_post_statusclasses\class-post-hashing.php:26
actionrest_api_initclasses\class-rest-api.php:20
actionshow_user_profilecustom-meta.php:57
actionedit_user_profilecustom-meta.php:58
actionuser_profile_update_errorscustom-meta.php:86
actionpersonal_options_updatecustom-meta.php:110
actionedit_user_profile_updatecustom-meta.php:111
actionrest_api_initcustom-meta.php:136
actionadmin_initcustom-meta.php:167
actionrest_api_initcustom-meta.php:185
actionrest_api_initcustom-meta.php:202
actionrest_api_initcustom-meta.php:229
actionadmin_initcustom-meta.php:295
actionrest_api_initcustom-meta.php:313
actionsave_postcustom-meta.php:379
actionadmin_initcustom-meta.php:450
actionrest_api_initcustom-meta.php:451
actionadd_meta_boxesstory-boosts.php:23
actionsave_poststory-boosts.php:73
actionthe_contentstory-boosts.php:83
actionloop_endstory-boosts.php:84
actionloop_startstory-boosts.php:87
actionwp_headstory-boosts.php:130
actionadmin_initstory-boosts.php:143
actionadmin_print_scriptsusers-page.php:28
actionadmin_head-users.phpusers-page.php:55
filtermanage_users_columnsusers-page.php:72
filtermanage_users_custom_columnusers-page.php:111
Maintenance & Trust

Civil Publisher Tools Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedJan 14, 2020
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Civil Publisher Tools Developer Profile

Civil

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Civil Publisher Tools

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/civil-publisher/build/post-panel.build.js

HTML / DOM Fingerprints

REST Endpoints
/wp-json/civil-publisher/v1/
FAQ

Frequently Asked Questions about Civil Publisher Tools