Interview Security & Risk Analysis

wordpress.org/plugins/interview

Interview plugin allows to create a webcam recorded interview width questions/answers, send it to applicants and quickly publish these interviews into …

30 active installs v1.01 PHP + WP 4.5+ Updated May 22, 2024
interviewspost-guestrecordscreen-recorder
70
B · Generally Safe
CVEs total1
Unpatched1
Last CVEMay 16, 2025
Safety Verdict

Is Interview Safe to Use in 2026?

Mostly Safe

Score 70/100

Interview is generally safe to use though it hasn't been updated recently. 1 past CVE were resolved. Keep it updated.

1 known CVE 1 unpatched Last CVE: May 16, 2025Updated 1yr ago
Risk Assessment

The "interview" plugin v1.01 presents a mixed security posture. On the positive side, it demonstrates good practices in SQL query handling, with 88% of queries using prepared statements, and a high rate of output escaping (92%). The plugin also includes a reasonable number of nonce checks (12), which is a fundamental security measure. However, there are significant areas of concern. The presence of one unprotected AJAX handler is a critical flaw, opening a potential attack vector. Furthermore, the taint analysis reveals three flows with unsanitized paths, although they are not categorized as critical or high severity. This warrants further investigation into the specific nature of these unsanitized paths. The plugin's vulnerability history is particularly alarming, with one currently unpatched medium severity CVE related to SQL injection. This indicates a recurring issue with how the plugin handles user input and database interactions, and the fact that it remains unpatched is a serious risk.

While the plugin shows strengths in areas like SQL prepared statements and output escaping, the combination of an unprotected AJAX handler, unsanitized taint flows, and a recent unpatched SQL injection vulnerability significantly elevates its risk profile. The plugin author needs to address the unprotected AJAX endpoint immediately and investigate the identified taint flows. The historical pattern of SQL injection vulnerabilities suggests a deeper architectural issue that needs a thorough code review and remediation to prevent future exploits. Users should exercise caution and consider the potential risks associated with using this plugin until these vulnerabilities are addressed.

Key Concerns

  • 1 unprotected AJAX handler
  • 3 flows with unsanitized paths
  • 1 currently unpatched medium CVE (SQL Injection)
  • 0 capability checks
Vulnerabilities
1

Interview Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-48137medium · 6.5Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Interview <= 1.01 - Authenticated (Contributor+) SQL Injection

May 16, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Interview Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
23 prepared
Unescaped Output
9
102 escaped
Nonce Checks
12
Capability Checks
0
File Operations
4
External Requests
0
Bundled Libraries
0

SQL Query Safety

88% prepared26 total queries

Output Escaping

92% escaped111 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
send_email_interview_over (interview.php:368)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Interview Attack Surface

Entry Points17
Unprotected1

AJAX Handlers 15

authwp_ajax_interview_insertinterview.php:191
authwp_ajax_interview_updateinterview.php:192
authwp_ajax_interview_delete_recordinterview.php:193
authwp_ajax_interview_duplicate_recordinterview.php:194
authwp_ajax_interview_getinterview.php:195
authwp_ajax_interview_save_questioninterview.php:197
noprivwp_ajax_interview_save_questioninterview.php:198
authwp_ajax_interview_change_langinterview.php:200
authwp_ajax_interview_get_with_answersinterview.php:201
authwp_ajax_interview_get_recordsinterview.php:202
authwp_ajax_interview_play_recordinterview.php:203
authwp_ajax_interview_inviteinterview.php:204
authwp_ajax_interview_create_postinterview.php:205
authwp_ajax_send_email_interview_overinterview.php:206
noprivwp_ajax_send_email_interview_overinterview.php:207

Shortcodes 2

[interview] interview.php:188
[interviewPublish] interview.php:189
WordPress Hooks 4
actionadmin_menuinterview.php:28
actioninitinterview.php:184
actionwp_enqueue_scriptsinterview.php:185
actionpre_get_postsinterview.php:186
Maintenance & Trust

Interview Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 22, 2024
PHP min version
Downloads1K

Community Trust

Rating100/100
Number of ratings2
Active installs30
Developer Profile

Interview Developer Profile

proxymis

5 plugins · 150 total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
359 days
View full developer profile
Detection Fingerprints

How We Detect Interview

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/interview/css/interviewAdmin.css/wp-content/plugins/interview/js/interviewAdmin.js/wp-content/plugins/interview/js/summernote/summernote-lite.min.css/wp-content/plugins/interview/js/summernote/summernote-lite.min.js
Script Paths
/wp-content/plugins/interview/js/interviewAdmin.js/wp-content/plugins/interview/js/summernote/summernote-lite.min.js
Version Parameters
interviewAdmin.css?cache=interviewAdmin.js?cache=interviewAdmin.js?ver=

HTML / DOM Fingerprints

CSS Classes
interviewErrorinterviewAdminContainerinterviewInviteContainerinviteInterviewContainerinterviewEditContainereditInterviewContainerinterviewAddContaineraddNewInterviewContainer+2 more
Data Attributes
data-interview-iddata-interview-question-id
JS Globals
params
FAQ

Frequently Asked Questions about Interview