Jobs Finder Security & Risk Analysis

wordpress.org/plugins/jobs-finder

Plugin "Jobs Finder" gives visitors the opportunity to more than 1 million offer of employment. Jobs search for USA, UK, Canada, Australia

10 active installs v2.1 PHP + WP 2.5+ Updated Mar 1, 2012
careeremploymentjobjob-vacanciesjobs
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Jobs Finder Safe to Use in 2026?

Generally Safe

Score 85/100

Jobs Finder has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The Jobs Finder plugin v2.1 exhibits a strong security posture in several key areas, particularly concerning its attack surface and SQL query handling. The absence of any recorded CVEs, combined with zero critical or high-severity vulnerabilities in its history, suggests a history of responsible development and patching. Furthermore, the static analysis reveals a remarkably small attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, no unprotected entry points. All SQL queries are also confirmed to use prepared statements, mitigating SQL injection risks.

However, a significant concern arises from the complete lack of output escaping, where 100% of the identified output points are unescaped. This presents a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website through various plugin functionalities. The absence of nonce checks and capability checks, while potentially justifiable if the limited attack surface means no sensitive operations are performed, still represents a potential weakness that could be exploited if new entry points are added or existing ones are misused without proper authorization controls. The lack of taint analysis data is also notable, making it impossible to assess risks associated with data flow within the plugin.

In conclusion, while the plugin excels in preventing common web vulnerabilities like SQL injection and limits its attack surface effectively, the unescaped output is a critical flaw that overshadows its strengths. Immediate attention should be given to implementing proper output escaping mechanisms. The absence of recorded vulnerabilities is positive but doesn't negate the current identified risks. A comprehensive security audit that includes taint analysis and thorough capability/nonce checks for all functionalities is recommended.

Key Concerns

  • 0% output escaping
  • 0 capability checks
  • 0 nonce checks
Vulnerabilities
None known

Jobs Finder Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Jobs Finder Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

Jobs Finder Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menujobs-finder.php:15
filterplugin_action_linksjobs-finder.php:93
actionplugins_loadedjobs-finder.php:121
Maintenance & Trust

Jobs Finder Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedMar 1, 2012
PHP min version
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Jobs Finder Developer Profile

PResponsive

4 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Jobs Finder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
submit
HTML Comments
Jobs Finder: http://www.onlinerel.com/wordpress-plugins/
Data Attributes
name="jobs_finder_widget_url_title"id="jobs_finder_widget_url_title"name="jobs_finder_widget_RSS_count_items"id="jobs_finder_widget_RSS_count_items"
Shortcode Output
<center><form name="form1" method="get" action="http://www.howfindajob.com/" target="_blank"><input type="text" id="s" name="s" value="" /><input type="submit" id="go" value="Find Jobs"/></form> </center><center>
FAQ

Frequently Asked Questions about Jobs Finder