VK Google Job Posting Manager Security & Risk Analysis

wordpress.org/plugins/vk-google-job-posting-manager

This plugin generates JSON-LD of your recruitment info which required to register Google Job Posting.

2K active installs v1.2.24 PHP 7.4+ WP 6.6+ Updated Jan 29, 2026
google-job-postinggutenbergrecruitment
98
A · Safe
CVEs total2
Unpatched0
Last CVEJan 23, 2026
Safety Verdict

Is VK Google Job Posting Manager Safe to Use in 2026?

Generally Safe

Score 98/100

VK Google Job Posting Manager has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Jan 23, 2026Updated 2mo ago
Risk Assessment

The "vk-google-job-posting-manager" plugin v1.2.24 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices with 100% of SQL queries using prepared statements and a high rate of proper output escaping (98%). It also has a complete absence of known vulnerabilities that are currently unpatched, which is a significant strength. The static analysis reveals a very small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication or permission checks, and no unsanitized flows were identified in the taint analysis.

However, several areas warrant attention. The presence of a dangerous function like `unserialize` is a notable concern, as it can lead to arbitrary code execution if untrusted data is unserialized. While no capability checks were explicitly found in the static analysis, the limited attack surface might be masking potential privilege escalation vectors if specific functionalities are invoked without proper checks. The vulnerability history, though currently free of unpatched issues, shows a past of two medium-severity CVEs, both related to Cross-Site Scripting (XSS). This pattern suggests a historical susceptibility to input sanitization issues, even if the current version has addressed them. The external HTTP requests are also a potential area for attack if not handled securely.

In conclusion, while the plugin has made significant improvements and currently presents a low risk due to no unpatched vulnerabilities and a well-controlled attack surface, the lingering presence of `unserialize` and past XSS vulnerabilities necessitate continued vigilance. Developers should prioritize auditing the usage of `unserialize` for any potential deserialization vulnerabilities and maintain a proactive approach to security testing, especially concerning input validation.

Key Concerns

  • Dangerous function: unserialize detected
  • Past medium severity CVEs (2 total)
  • External HTTP requests detected
Vulnerabilities
2

VK Google Job Posting Manager Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
1 CVE in 2026
2026
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-12836medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

VK Google Job Posting Manager <= 1.2.23 - Authenticated (Author+) Stored Cross-Site Scripting via Job Description Field

Jan 23, 2026 Patched in 1.2.24 (11d)
CVE-2025-68070medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

VK Google Job Posting Manager <= 1.2.22 - Authenticated (Contributor+) Stored Cross-Site Scripting

Dec 15, 2025 Patched in 1.2.23 (5d)
Code Analysis
Analyzed Mar 16, 2026

VK Google Job Posting Manager Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
3
121 escaped
Nonce Checks
6
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Dangerous Functions Found

unserialize$field_value = unserialize( get_post_meta( $post->ID, $key, true ) );inc\custom-field-builder\package\custom-field-builder.php:256

Output Escaping

98% escaped124 total outputs
Data Flows
All sanitized

Data Flow Analysis

4 flows
<custom-field-builder> (inc\custom-field-builder\package\custom-field-builder.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

VK Google Job Posting Manager Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actioninitblocks\vk-google-job-posting-manager-block.php:108
filterblock_categories_allblocks\vk-google-job-posting-manager-block.php:132
filterblock_categoriesblocks\vk-google-job-posting-manager-block.php:134
actionadmin_menuinc\custom-field-builder\custom-field-builder-config.php:24
actionsave_postinc\custom-field-builder\custom-field-builder-config.php:25
actionadmin_footerinc\custom-field-builder\package\custom-field-builder.php:22
actioninitinc\custom-posttype-builder.php:60
filterpost_updated_messagesinc\custom-posttype-builder.php:108
actionenqueue_block_editor_assetsvk-google-job-posting-manager.php:50
actionadmin_menuvk-google-job-posting-manager.php:73
actionadmin_enqueue_scriptsvk-google-job-posting-manager.php:89
actionwp_headvk-google-job-posting-manager.php:463
actionwp_insert_postvk-google-job-posting-manager.php:490
Maintenance & Trust

VK Google Job Posting Manager Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 29, 2026
PHP min version7.4
Downloads37K

Community Trust

Rating80/100
Number of ratings2
Active installs2K
Developer Profile

VK Google Job Posting Manager Developer Profile

Vektor,Inc.

8 plugins · 241K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
126 days
View full developer profile
Detection Fingerprints

How We Detect VK Google Job Posting Manager

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/vk-google-job-posting-manager/assets/css/admin.css
Version Parameters
vk-google-job-posting-manager/assets/css/admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
vgjpm
Data Attributes
vgjpm_nonce
FAQ

Frequently Asked Questions about VK Google Job Posting Manager