Pathshala Security & Risk Analysis

wordpress.org/plugins/pathshala

License: GPLv2 or later License URI: https://www.gnu.org/licenses/gpl-2.0.html Pathshala is a complete eLearning management solution for WordPress.

0 active installs v1.0.0 PHP + WP 4.4+ Updated Jul 7, 2021
courseselearninglearning-management
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Pathshala Safe to Use in 2026?

Generally Safe

Score 85/100

Pathshala has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "pathshala" v1.0.0 plugin exhibits a generally positive security posture based on the static analysis provided. The absence of any recorded CVEs and the fact that all identified SQL queries utilize prepared statements are strong indicators of good development practices. Furthermore, the plugin demonstrates an awareness of security by including a nonce check and a capability check, which are essential for protecting against common web vulnerabilities. The limited attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are directly exposed without checks, further contributes to its secure design.

However, a notable concern arises from the output escaping. With only 31% of 13 total outputs being properly escaped, there is a significant risk of cross-site scripting (XSS) vulnerabilities. This means that user-supplied data, if not handled carefully by other parts of the code not detailed here, could be rendered directly into the HTML without sufficient sanitization, potentially allowing attackers to inject malicious scripts. The absence of any taint analysis flows with unsanitized paths, while seemingly positive, might also be due to a limited scope of analysis or a lack of complex data flows within the plugin. The vulnerability history is clean, which is excellent, but the output escaping issue remains a specific area that requires immediate attention to mitigate potential risks.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Pathshala Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Pathshala Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
4 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

31% escaped13 total outputs
Attack Surface

Pathshala Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actioninitincludes\class-pathshala.php:82
actionplugins_loadedincludes\class-pathshala.php:153
actionadmin_enqueue_scriptsincludes\class-pathshala.php:168
actionadmin_enqueue_scriptsincludes\class-pathshala.php:169
actionwp_enqueue_scriptsincludes\class-pathshala.php:184
actionwp_enqueue_scriptsincludes\class-pathshala.php:185
actionadd_meta_boxes_pathshalaincludes\class-post-type.php:20
actionsave_post_pathshalaincludes\class-post-type.php:22
actionadmin_enqueue_scriptsincludes\class-post-type.php:239
filtertemplate_includepathashala.php:75
Maintenance & Trust

Pathshala Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedJul 7, 2021
PHP min version
Downloads903

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Pathshala Developer Profile

Robin

2 plugins · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pathshala

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pathshala/admin/css/pathshala-admin.css/wp-content/plugins/pathshala/admin/js/pathshala-admin.js
Script Paths
/wp-content/plugins/pathshala/admin/js/pathshala-admin.js
Version Parameters
pathshala-admin?ver=pathshala?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Pathshala