LMC XML Reader Security & Risk Analysis

wordpress.org/plugins/lmc-xml-reader

LMC XML Reader plugin can load, parse and display an external XML file from given URL (LMC.cz, Jobs.cz, Prace.cz, Teamio.com).

10 active installs v1.1 PHP + WP 2.2+ Updated Nov 6, 2017
czechlmcshortcodexmlcesky
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is LMC XML Reader Safe to Use in 2026?

Generally Safe

Score 85/100

LMC XML Reader has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'lmc-xml-reader' v1.1 plugin presents a mixed security posture. On the positive side, it exhibits no known historical vulnerabilities (CVEs) and its static analysis reveals no dangerous functions, no raw SQL queries, and no file operations. The absence of critical or high-severity taint flows is also reassuring. However, significant concerns arise from the code analysis. The complete lack of output escaping (0% properly escaped) on 35 outputs is a critical weakness, leaving the plugin highly susceptible to Cross-Site Scripting (XSS) attacks. Furthermore, the absence of nonce checks and capability checks on its single shortcode entry point means that any authenticated user could potentially trigger unintended actions through this shortcode. The single external HTTP request also warrants scrutiny, though without further context, its risk is indeterminate. The plugin's lack of historical vulnerabilities might indicate either a very low-risk plugin or simply a lack of in-depth security auditing. Coupled with the identified output escaping and authorization weaknesses, the plugin, despite its clean history, carries a substantial risk.

Key Concerns

  • All outputs are unescaped
  • Shortcode lacks nonce checks
  • Shortcode lacks capability checks
Vulnerabilities
None known

LMC XML Reader Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

LMC XML Reader Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
35
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped35 total outputs
Attack Surface

LMC XML Reader Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[lmc-xml] lmc-xml-reader.php:441
WordPress Hooks 1
actionwidgets_initlmc-xml-reader.php:334
Maintenance & Trust

LMC XML Reader Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedNov 6, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

LMC XML Reader Developer Profile

JosefStepanek

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect LMC XML Reader

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/lmc-xml-reader/lmc-xml-reader.php

HTML / DOM Fingerprints

CSS Classes
lmc-datelmc-divlmc-showlmc-hidden-limitlmc-desclmc-itemlmc-noresultslmc-show+1 more
Data Attributes
data-relateddata-companydata-location
JS Globals
relatedpositionscounterregion
Shortcode Output
<option value="<div class="lmc-div<div class="lmc-item<a href="
FAQ

Frequently Asked Questions about LMC XML Reader