StudyPress Security & Risk Analysis

wordpress.org/plugins/studypress

The easy way to create pretty multimedia lessons, quizzes and sliders.

20 active installs v1.1.2 PHP + WP 3.6.1+ Updated Feb 7, 2016
authoringauthoring-toole-learningeducationelearning
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is StudyPress Safe to Use in 2026?

Generally Safe

Score 85/100

StudyPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The studypress v1.1.2 plugin exhibits a mixed security posture. While it boasts no known CVEs and a low number of critical or high-severity issues identified in taint analysis, several concerning patterns emerge from the static code analysis. The extremely low rate of proper output escaping (1%) is a significant concern, suggesting a high risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is rendered without adequate sanitization. Additionally, the complete absence of nonce checks and the presence of raw SQL queries (32% of total) are red flags, potentially opening the door to Cross-Site Request Forgery (CSRF) and SQL Injection (SQLi) attacks, respectively.

The vulnerability history is currently clean, which is a positive indicator. However, this can sometimes be misleading as the lack of historical vulnerabilities does not guarantee future security, especially given the weaknesses identified in the static analysis. The plugin's limited attack surface (3 shortcodes) is a strength, but the lack of protection around these entry points (0 unprotected) is a major oversight. In conclusion, while there are no *currently* documented vulnerabilities, the plugin contains several fundamental security flaws that expose it to significant risks. The low output escaping and the presence of raw SQL queries are the most pressing concerns.

Key Concerns

  • Extremely low output escaping rate (1%)
  • 0 nonce checks present
  • 32% of SQL queries are not prepared
  • All 4 taint flows have unsanitized paths
  • 0 capability checks on entry points
Vulnerabilities
None known

StudyPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

StudyPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
26
56 prepared
Unescaped Output
304
2 escaped
Nonce Checks
0
Capability Checks
2
File Operations
4
External Requests
0
Bundled Libraries
0

SQL Query Safety

68% prepared82 total queries

Output Escaping

1% escaped306 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
<modCourse.view> (Views\admin\modCourse.view.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

StudyPress Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[studypress_lesson] actions-studypress.php:79
[studypress_quiz] actions-studypress.php:103
[studypress_child] actions-studypress.php:190
WordPress Hooks 14
actionadmin_print_scriptsactions-studypress.php:5
actionwp_headactions-studypress.php:30
actioninitactions-studypress.php:47
actiondelete_term_taxonomyactions-studypress.php:57
actiondelete_useractions-studypress.php:67
filtersanitize_file_nameactions-studypress.php:75
filtermce_buttons_2actions-studypress.php:147
actionwp_loadedactions-studypress.php:149
actionadmin_initMigration\v0.12tov1.0.php:76
actionadmin_noticesnotices.php:15
actionadmin_initnotices.php:37
actionadmin_noticesnotices.php:58
actionadmin_menuStudy-Press.php:25
actionafter_wp_tiny_mceViews\admin\modLesson.view.php:344
Maintenance & Trust

StudyPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedFeb 7, 2016
PHP min version
Downloads18K

Community Trust

Rating76/100
Number of ratings15
Active installs20
Developer Profile

StudyPress Developer Profile

Mohammed Tadlaoui

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect StudyPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/studypress/css/studypress-bootstrap.css/wp-content/plugins/studypress/css/studypress-main.css/wp-content/plugins/studypress/css/studypress-sliders.css/wp-content/plugins/studypress/js/studypress.js/wp-content/plugins/studypress/js/studypress-bootstrap.js/wp-content/plugins/studypress/js/studypress-sliders.js
Script Paths
/wp-content/plugins/studypress/js/studypress.js/wp-content/plugins/studypress/js/studypress-bootstrap.js/wp-content/plugins/studypress/js/studypress-sliders.js
Version Parameters
studypress/css/studypress-bootstrap.css?ver=studypress/css/studypress-main.css?ver=studypress/css/studypress-sliders.css?ver=studypress/js/studypress.js?ver=studypress/js/studypress-bootstrap.js?ver=studypress/js/studypress-sliders.js?ver=

HTML / DOM Fingerprints

CSS Classes
sp-course-slidersp-course-lesson-slidersp-slide-slider
Shortcode Output
[studypress_courses][studypress_course][studypress_lessons][studypress_lesson]
FAQ

Frequently Asked Questions about StudyPress