Course Security & Risk Analysis

wordpress.org/plugins/course

A plugin that will create a custom post type displaying courses offered by an institution.

40 active installs v1.0 PHP + WP 3.0+ Updated Nov 9, 2025
coursecoursescourses-for-institutestudent
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Course Safe to Use in 2026?

Generally Safe

Score 100/100

Course has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The "course" v1.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, cron events, and file operations significantly limits its attack surface. Furthermore, the code analysis reveals no dangerous functions, no raw SQL queries (all using prepared statements), and no external HTTP requests. This indicates good development practices in these critical areas.

However, a notable concern is the relatively low percentage of properly escaped output (55%). This means that approximately half of the plugin's output may be susceptible to cross-site scripting (XSS) vulnerabilities. While no taint flows with unsanitized paths or critical/high severities were detected in this analysis, the unescaped output represents a tangible risk. The plugin also has no recorded vulnerability history, which is a positive sign, but it's important to remember that this could also be due to its relative newness or lack of extensive security auditing.

In conclusion, the plugin demonstrates several strengths, particularly in its limited attack surface and secure handling of database operations. The primary weakness identified is the significant proportion of unescaped output, which should be addressed to mitigate potential XSS risks. The lack of historical vulnerabilities is encouraging but should not be a substitute for proactive security measures. A focused effort on output escaping would greatly enhance the plugin's overall security.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

Course Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Course Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
18 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

55% escaped33 total outputs
Attack Surface

Course Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actioninitcourse.php:12
actioninitcourse.php:46
actionadmin_initcourse.php:65
actionsave_postcourse.php:112
filtermanage_edit-course_columnscourse.php:136
actionmanage_posts_custom_columncourse.php:147
actionrestrict_manage_postscourse.php:165
filterparse_querycourse.php:186
filtertemplate_includecourse.php:196
Maintenance & Trust

Course Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedNov 9, 2025
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs40
Developer Profile

Course Developer Profile

imran3229

2 plugins · 60 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Course

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Course