Job Tracker Security & Risk Analysis
wordpress.org/plugins/job-trackerTrack jobs and create invoices for completed or shipped jobs.
Is Job Tracker Safe to Use in 2026?
Generally Safe
Score 85/100Job Tracker has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'job-tracker' plugin v0.1.9 exhibits significant security concerns despite its clean vulnerability history. The static analysis reveals a high number of potentially dangerous function calls, specifically `unserialize`, which is often a vector for remote code execution if used with untrusted input. Furthermore, a very low percentage of SQL queries use prepared statements, increasing the risk of SQL injection vulnerabilities. The extremely low rate of properly escaped output is another major red flag, suggesting that data displayed to users might be vulnerable to cross-site scripting (XSS) attacks. The absence of nonce checks on AJAX handlers and a single capability check for all entry points are alarming, indicating a lack of robust access control. The taint analysis confirms these concerns, with all analyzed flows having unsanitized paths and a notable number of high-severity flows, suggesting potential data leakage or manipulation risks.
While the plugin has no recorded CVEs, this should not be interpreted as a sign of strong security. It might simply mean that vulnerabilities have not been discovered or publicly disclosed yet. The static analysis findings, particularly the use of `unserialize`, the prevalence of raw SQL queries, and inadequate output escaping, point to a fundamentally insecure coding practice. The presence of high-severity unsanitized flows is particularly concerning. The plugin's overall security posture is weak due to these fundamental coding flaws, outweighing the positive aspect of its zero known CVEs. Developers should prioritize addressing these static analysis findings to mitigate potential risks.
Key Concerns
- Dangerous function 'unserialize' used
- Low percentage of prepared SQL statements
- Very low percentage of properly escaped output
- High severity unsanitized taint flows
- No nonce checks on AJAX
- Minimal capability checks
Job Tracker Security Vulnerabilities
Job Tracker Release Timeline
Job Tracker Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Job Tracker Attack Surface
WordPress Hooks 6
Maintenance & Trust
Job Tracker Maintenance & Trust
Maintenance Signals
Community Trust
Job Tracker Alternatives
No alternatives data available yet.
Job Tracker Developer Profile
4 plugins · 80 total installs
How We Detect Job Tracker
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/job-tracker/js/jquery.tablesorter.min.js/wp-content/plugins/job-tracker/js/jquery.autogrow-textarea.js/wp-content/plugins/job-tracker/js/job-tracker.js/wp-content/plugins/job-tracker/css/wp_admin.css/wp-content/plugins/job-tracker/js/jquery.tablesorter.min.js/wp-content/plugins/job-tracker/js/jquery.autogrow-textarea.js/wp-content/plugins/job-tracker/js/job-tracker.jsjob-tracker/js/jquery.tablesorter.min.js?ver=job-tracker/js/jquery.autogrow-textarea.js?ver=job-tracker/js/job-tracker.js?ver=job-tracker/css/wp_admin.css?v=HTML / DOM Fingerprints
job_tracker_frontend_cssjob_tracker