WPLMS GA Security & Risk Analysis

wordpress.org/plugins/integrate-wplms-ga

WPLMS GA is an integration of Google Analytics with WPLMS

60 active installs v1.0 PHP + WP 3.6+ Updated Apr 21, 2017
gagoogle-analyticswplmswplms-ga
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPLMS GA Safe to Use in 2026?

Generally Safe

Score 85/100

WPLMS GA has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "integrate-wplms-ga" plugin v1.0 presents a concerning security posture due to critical weaknesses identified in the static analysis. While the plugin demonstrates good practices by avoiding dangerous functions and using prepared statements for its SQL queries, these strengths are overshadowed by significant risks in other areas. The most alarming finding is the presence of an unprotected AJAX handler, which represents a direct entry point for potential attackers. Furthermore, the complete lack of output escaping means that any data processed or displayed by the plugin is vulnerable to injection attacks, such as Cross-Site Scripting (XSS). The taint analysis also reveals flows with unsanitized paths, indicating that user-supplied data might not be properly validated or cleaned before being used, further exacerbating the XSS risk. The absence of vulnerability history suggests a lack of past issues, which could indicate either a well-developed plugin or simply a lack of public reporting. However, relying on this is risky given the current static analysis findings. In conclusion, despite some positive coding practices, the "integrate-wplms-ga" plugin v1.0 has critical security flaws that require immediate attention, particularly the unprotected AJAX handler and the pervasive output escaping issues.

Key Concerns

  • Unprotected AJAX handler identified
  • Outputs not properly escaped
  • Taint flows with unsanitized paths
  • Missing nonce checks on AJAX
  • Missing capability checks
Vulnerabilities
None known

WPLMS GA Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WPLMS GA Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
track_question (includes\class.init.php:90)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

WPLMS GA Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_quiz_questionincludes\class.init.php:21
WordPress Hooks 6
actionwp_headincludes\class.init.php:17
actionwp_footerincludes\class.init.php:18
actionwplms_unit_headerincludes\class.init.php:20
filterwplms_take_this_course_button_labelincludes\class.init.php:23
filterlms_general_settingsincludes\class.init.php:24
actionplugins_loadedloader.php:32
Maintenance & Trust

WPLMS GA Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedApr 21, 2017
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs60
Developer Profile

WPLMS GA Developer Profile

VibeThemes

20 plugins · 4K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WPLMS GA

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/integrate-wplms-ga/includes/js/wplms_ga.js

HTML / DOM Fingerprints

JS Globals
gawplms
FAQ

Frequently Asked Questions about WPLMS GA