Connector to CiviCRM with CiviMcRestFace Security & Risk Analysis

wordpress.org/plugins/connector-civicrm-mcrestface

Provides an API connector to a local or remote CiviCRM installation. This connector could be used by other plugins. Funded by Artfulrobot, CiviCoop, c …

200 active installs v1.0.12 PHP 7.2+ WP 5.2+ Updated Jun 17, 2025
apicivicrmconnectorrest
98
A · Safe
CVEs total2
Unpatched0
Last CVEApr 9, 2025
Safety Verdict

Is Connector to CiviCRM with CiviMcRestFace Safe to Use in 2026?

Generally Safe

Score 98/100

Connector to CiviCRM with CiviMcRestFace has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Apr 9, 2025Updated 9mo ago
Risk Assessment

The plugin 'connector-civicrm-mcrestface' v1.0.12 exhibits a mixed security posture. While the static analysis shows a remarkably small attack surface with no identified unprotected entry points (AJAX, REST API, shortcodes, cron), and no dangerous functions or file operations, there are concerning areas related to input sanitization and authorization.

The code analysis reveals that a significant portion of SQL queries (71%) are not using prepared statements, which is a major risk for SQL injection vulnerabilities. Furthermore, only 61% of output is properly escaped, leaving room for Cross-Site Scripting (XSS) attacks. The absence of any nonce checks is a significant security oversight, particularly for any potential, even if currently undetected, AJAX operations.

The vulnerability history is particularly worrying, with two medium-severity CVEs previously recorded for Cross-site Scripting and Missing Authorization. The fact that these vulnerabilities have been patched is positive, but the recurring nature of these common vulnerability types suggests a historical pattern of insecure coding practices that could resurface. The plugin's last vulnerability was in April 2025, which is in the future, suggesting potential data entry error or an indicator of a known but not yet exploited vulnerability. Overall, the lack of identified vulnerabilities in the current static analysis is offset by the historical data and the identified weaknesses in SQL and output handling.

Key Concerns

  • SQL queries not using prepared statements
  • Output escaping is not properly handled
  • Missing nonce checks
  • Two past medium severity vulnerabilities
Vulnerabilities
2

Connector to CiviCRM with CiviMcRestFace Security Vulnerabilities

CVEs by Year

2 CVEs in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-32551medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Connector to CiviCRM with CiviMcRestFace <= 1.0.8 - Reflected Cross-Site Scripting

Apr 9, 2025 Patched in 1.0.9 (43d)
CVE-2025-31618medium · 5.3Missing Authorization

Connector to CiviCRM with CiviMcRestFace <= 1.0.10 - Missing Authorization

Mar 31, 2025 Patched in 1.0.11 (80d)
Code Analysis
Analyzed Mar 16, 2026

Connector to CiviCRM with CiviMcRestFace Code Analysis

Dangerous Functions
0
Raw SQL Queries
10
4 prepared
Unescaped Output
15
23 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

29% prepared14 total queries

Output Escaping

61% escaped38 total outputs
Attack Surface

Connector to CiviCRM with CiviMcRestFace Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initCMRF\Wordpress\Admin\AdminPage.php:14
actionadmin_menuCMRF\Wordpress\Admin\AdminPage.php:15
filterplugin_action_linksCMRF\Wordpress\Admin\AdminPage.php:16
actioninitwpcmrf.php:37
actionwpmu_new_blogwpcmrf.php:148
Maintenance & Trust

Connector to CiviCRM with CiviMcRestFace Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedJun 17, 2025
PHP min version7.2
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs200
Developer Profile

Connector to CiviCRM with CiviMcRestFace Developer Profile

Jaap Jansma

6 plugins · 540 total installs

82
trust score
Avg Security Score
91/100
Avg Patch Time
62 days
View full developer profile
Detection Fingerprints

How We Detect Connector to CiviCRM with CiviMcRestFace

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/connector-civicrm-mcrestface/CMRF/Wordpress/Core.php/wp-content/plugins/connector-civicrm-mcrestface/CMRF/Wordpress/Admin/AdminPage.php/wp-content/plugins/connector-civicrm-mcrestface/CMRF/Wordpress/Connection/Curl.php/wp-content/plugins/connector-civicrm-mcrestface/CMRF/Wordpress/Connection/CurlAuthX.php/wp-content/plugins/connector-civicrm-mcrestface/CMRF/Wordpress/Connection/Local.php/wp-content/plugins/connector-civicrm-mcrestface/CMRF/Wordpress/Call.php

HTML / DOM Fingerprints

JS Globals
wpcmrf_api
REST Endpoints
/wp-json/wpcmrf/
FAQ

Frequently Asked Questions about Connector to CiviCRM with CiviMcRestFace