Woo to Moodle Security & Risk Analysis

wordpress.org/plugins/woo-to-moodle

This plugin will automatically enroll in Moodle customers who buy the course in WooCommerce.

20 active installs v1.1 PHP + WP 4.0+ Updated Mar 14, 2018
coursemoodleregisterwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Woo to Moodle Safe to Use in 2026?

Generally Safe

Score 85/100

Woo to Moodle has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'woo-to-moodle' plugin v1.1 exhibits a generally strong security posture based on the provided static analysis. The absence of direct attack surface entry points like AJAX handlers, REST API routes, or shortcodes is a significant positive, indicating a well-contained plugin. Furthermore, the lack of critical or high-severity taint flows is reassuring, suggesting no obvious pathways for malicious data injection through the analyzed code.

However, there are areas for improvement. The most significant concern is the SQL query implementation: 100% of the 7 detected SQL queries do not use prepared statements. This presents a substantial risk of SQL injection vulnerabilities, especially if the data used in these queries originates from user input. While the plugin has no recorded vulnerability history, this doesn't guarantee future safety, and the current code practices make it susceptible to potential exploits. The external HTTP request also warrants a brief mention, as it could be a vector for further vulnerabilities if not handled securely.

In conclusion, the plugin has a low attack surface and no critical taint issues, which are strong points. However, the complete lack of prepared statements for SQL queries is a critical security oversight that significantly increases the risk of exploitation. While its vulnerability history is clean, proactive security measures, particularly concerning database interactions, are essential for long-term safety.

Key Concerns

  • SQL queries without prepared statements
  • External HTTP request without context
Vulnerabilities
None known

Woo to Moodle Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Woo to Moodle Code Analysis

Dangerous Functions
0
Raw SQL Queries
7
0 prepared
Unescaped Output
12
15 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

0% prepared7 total queries

Output Escaping

56% escaped27 total outputs
Attack Surface

Woo to Moodle Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionplugins_loadedwoo-to-moodle.php:24
actionadmin_menuwoo-to-moodle.php:32
actionadmin_initwoo-to-moodle.php:38
actionadmin_menuwoo-to-moodle.php:72
actionwoocommerce_payment_completewoo-to-moodle.php:85
filterwp_mail_fromwootomoo_payment_complete.php:163
filterwp_mail_from_namewootomoo_payment_complete.php:164
Maintenance & Trust

Woo to Moodle Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMar 14, 2018
PHP min version
Downloads3K

Community Trust

Rating20/100
Number of ratings1
Active installs20
Developer Profile

Woo to Moodle Developer Profile

kojihugy

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Woo to Moodle

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/woo-to-moodle/css/wootomoo.css/wp-content/plugins/woo-to-moodle/js/wootomoo.js
Script Paths
/wp-content/plugins/woo-to-moodle/js/wootomoo.js
Version Parameters
woo-to-moodle/css/wootomoo.css?ver=woo-to-moodle/js/wootomoo.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Woo to Moodle