Advance mailchimp for WPLMS Security & Risk Analysis

wordpress.org/plugins/advance-mailchimp-for-wplms

Simple and Advance MailChimp integration for .

10 active installs v1.0 PHP + WP 3.5.1+ Updated Apr 29, 2016
mailchimpsubscriptionwoocommercewplms
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Advance mailchimp for WPLMS Safe to Use in 2026?

Generally Safe

Score 85/100

Advance mailchimp for WPLMS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The security posture of 'advance-mailchimp-for-wplms' v1.0 appears mixed, with some positive indicators but also areas requiring attention. On the positive side, the plugin demonstrates good practices by utilizing prepared statements for all SQL queries and appears to have a limited attack surface in terms of direct entry points like AJAX handlers, REST API routes, and shortcodes. The complete absence of known CVEs is also a strong positive sign, suggesting a history of responsible development or limited exposure.

However, several concerns arise from the static analysis. The presence of dangerous functions like `ini_set` and `unserialize` warrants careful scrutiny, as these can be exploited if user-supplied data is not properly sanitized before being passed to them. The low percentage of properly escaped output (20%) is a significant risk, potentially leading to Cross-Site Scripting (XSS) vulnerabilities if user-generated content is displayed without adequate escaping. Furthermore, while there's one nonce check and one capability check, the overall limited number of entry points analyzed might mean these checks aren't comprehensively applied across all potential interaction points.

The lack of any recorded vulnerabilities in its history is a good indicator, but it's important to note that this can also be due to the plugin's age or lack of widespread adoption. The absence of taint analysis results also makes it difficult to fully assess the risk associated with data flow and sanitization. In conclusion, while the plugin has some strengths in its SQL handling and attack surface management, the use of dangerous functions and the insufficient output escaping present notable risks that should be addressed.

Key Concerns

  • Insufficient output escaping (80% unescaped)
  • Presence of dangerous functions (unserialize, ini_set)
  • Limited number of capability checks identified
  • Limited number of nonce checks identified
Vulnerabilities
None known

Advance mailchimp for WPLMS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Advance mailchimp for WPLMS Release Timeline

v0.1
Code Analysis
Analyzed Apr 16, 2026

Advance mailchimp for WPLMS Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
4
1 escaped
Nonce Checks
1
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

ini_setini_set("arg_separator.output", "&");classes/api/class-MCAPI.php:80
ini_setini_set("arg_separator.output", $orig_sep);classes/api/class-MCAPI.php:90
unserialize$serial = unserialize($response);classes/api/class-MCAPI.php:143

Output Escaping

20% escaped5 total outputs
Attack Surface

Advance mailchimp for WPLMS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actionplugins_loadedadvance-mailchimp-for-WPLMS.php:19
filterwoocommerce_integrationsadvance-mailchimp-for-WPLMS.php:38
actionadd_meta_boxesadvance-mailchimp-for-WPLMS.php:60
actionsave_postadvance-mailchimp-for-WPLMS.php:134
actionadmin_noticesclasses/class-ss-wc-integration-mailchimp.php:55
actionwoocommerce_update_options_integrationclasses/class-ss-wc-integration-mailchimp.php:56
actionwoocommerce_checkout_update_order_metaclasses/class-ss-wc-integration-mailchimp.php:60
actionwoocommerce_order_status_changedclasses/class-ss-wc-integration-mailchimp.php:63
actionwplms_the_course_buttonclasses/class-ss-wc-integration-mailchimp.php:65
filterwoocommerce_checkout_fieldsclasses/class-ss-wc-integration-mailchimp.php:68
filterdefault_checkout_ad_wc_mailchimp_opt_inclasses/class-ss-wc-integration-mailchimp.php:69
actionwoocommerce_checkout_update_order_metaclasses/class-ss-wc-integration-mailchimp.php:72
Maintenance & Trust

Advance mailchimp for WPLMS Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedApr 29, 2016
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Advance mailchimp for WPLMS Developer Profile

wordpress Expert

3 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Advance mailchimp for WPLMS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/advance-mailchimp-for-wplms/assets/css/style.css/wp-content/plugins/advance-mailchimp-for-wplms/assets/js/main.js
Script Paths
/wp-content/plugins/advance-mailchimp-for-wplms/assets/js/main.js
Version Parameters
advance-mailchimp-for-wplms/assets/css/style.css?ver=advance-mailchimp-for-wplms/assets/js/main.js?ver=

HTML / DOM Fingerprints

CSS Classes
mailchip_list
Data Attributes
name="_mailchip_list"id="mailchip_list"name="_mailchip_grouping"name="_mailchip_group"
FAQ

Frequently Asked Questions about Advance mailchimp for WPLMS