Learning Objects LMS Security & Risk Analysis

wordpress.org/plugins/learning-objects-lms

Learning Objects LMS is a plugin for Woocommerce that allows you to connect your shop or website to the professional Learning Objects environment for …

10 active installs v1.2.3 PHP 7.2+ WP 5.6+ Updated Jan 26, 2023
educationelearninglearning-management-systemlmswoocommerce-lms
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Learning Objects LMS Safe to Use in 2026?

Generally Safe

Score 85/100

Learning Objects LMS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The static analysis of the 'learning-objects-lms' plugin v1.2.3 reveals a generally positive security posture with several good practices observed. The complete absence of exposed AJAX handlers, REST API routes, shortcodes, and cron events, particularly those without authentication checks, significantly reduces the plugin's attack surface. Furthermore, all SQL queries utilize prepared statements, and the vast majority of output is properly escaped, mitigating common web vulnerabilities. The lack of file operations and dangerous functions is also a strong indicator of secure coding practices.

However, there are a few areas for concern. The presence of two taint analysis flows with unsanitized paths, even without critical or high severity, warrants attention as it suggests potential pathways for malicious input to be processed without adequate sanitization. The fact that there are no explicit capability checks or nonce checks, while not directly exploited given the limited attack surface, could become a vulnerability if new entry points are introduced in future versions. The plugin's history of zero known CVEs is a strong positive, indicating a likely track record of security.

In conclusion, the 'learning-objects-lms' plugin v1.2.3 demonstrates a commendable effort towards security with a minimal attack surface and good handling of SQL and output. The primary area for improvement lies in addressing the identified unsanitized taint flows and considering the implementation of capability and nonce checks to build resilience against potential future vulnerabilities. The lack of historical vulnerabilities is a significant strength.

Key Concerns

  • Taint flows with unsanitized paths detected
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Learning Objects LMS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Learning Objects LMS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
35 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
6
Bundled Libraries
0

Output Escaping

97% escaped36 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
wcloi_config_wclo_integration (include\interfaccie-amministrative.php:11)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Learning Objects LMS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionwoocommerce_product_options_inventory_product_datainclude\campi-aggiuntivi-woocommerce.php:42
actionwoocommerce_process_product_metainclude\campi-aggiuntivi-woocommerce.php:60
actionprofile_updateinclude\function.php:16
actionuser_registerinclude\function.php:145
actionwoocommerce_order_status_completedinclude\function.php:183
actionwoocommerce_email_customer_detailsinclude\function.php:198
actionadmin_noticesinclude\function.php:410
actionadmin_menuinclude\interfaccie-amministrative.php:104
actionvalid-paypal-standard-ipn-requestinclude\paypal.php:29
actionwoocommerce_paypal_express_checkout_valid_ipn_requestinclude\paypal.php:30
actionwc_gateway_stripe_process_paymentinclude\paypal.php:46
actionwc_gateway_stripe_process_responseinclude\paypal.php:47
actioninitlearning-objects-lms.php:64
Maintenance & Trust

Learning Objects LMS Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedJan 26, 2023
PHP min version7.2
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Learning Objects LMS Developer Profile

qltechsrl

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Learning Objects LMS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/learning-objects-lms/css/style.css/wp-content/plugins/learning-objects-lms/css/style-backend.css
Script Paths
/wp-content/plugins/learning-objects-lms/js/backend.js/wp-content/plugins/learning-objects-lms/js/frontend.js
Version Parameters
learning-objects-lms/css/style.css?ver=learning-objects-lms/css/style-backend.css?ver=learning-objects-lms/js/backend.js?ver=learning-objects-lms/js/frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
wcloi-custom-field
Data Attributes
wcloi_prodotto_lowcloi_prodotto_ecmwcloi_scadenza_giorni_text_field_title
FAQ

Frequently Asked Questions about Learning Objects LMS