Ajax Load More for Terms Security & Risk Analysis

wordpress.org/plugins/ajax-load-more-for-terms

Ajax Load More extension that adds compatibility for infinite scrolling WordPress terms using term_query.

100 active installs v1.2.0 PHP + WP 4.0+ Updated Nov 13, 2025
categoryinfinite-scrolltagtaxonomyterms
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ajax Load More for Terms Safe to Use in 2026?

Generally Safe

Score 100/100

Ajax Load More for Terms has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The "ajax-load-more-for-terms" plugin version 1.2.0 exhibits a mixed security posture. On the positive side, the code demonstrates good practices regarding SQL queries, all of which are prepared statements, and output escaping is consistently applied to all identified outputs. There are no recorded vulnerabilities or CVEs associated with this plugin, suggesting a history of stable and secure development. Furthermore, the absence of file operations, external HTTP requests, and bundled libraries further reduces potential attack vectors.

However, a significant concern arises from the identified attack surface. The plugin exposes two AJAX handlers, and critically, both of these lack authentication checks. This means that any unauthenticated user could potentially trigger these handlers, which could lead to unintended actions or information disclosure if the handler's functionality is sensitive. The lack of nonce checks on these AJAX handlers further exacerbates this risk, as it prevents basic protection against cross-site request forgery (CSRF) attacks.

In conclusion, while the core coding practices for data handling and output appear sound, the unprotected AJAX endpoints represent a notable security weakness. The absence of any past vulnerabilities is a positive indicator, but it does not mitigate the current risk posed by these exposed entry points. Addressing the lack of authentication and nonce checks on the AJAX handlers should be a priority to improve the plugin's overall security.

Key Concerns

  • AJAX handlers without authentication checks
  • AJAX handlers without nonce checks
Vulnerabilities
None known

Ajax Load More for Terms Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Ajax Load More for Terms Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
15 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped15 total outputs
Attack Surface
2 unprotected

Ajax Load More for Terms Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_alm_get_termsajax-load-more-for-terms.php:41
noprivwp_ajax_alm_get_termsajax-load-more-for-terms.php:42
WordPress Hooks 3
actionalm_terms_installedajax-load-more-for-terms.php:38
filteralm_terms_shortcodeajax-load-more-for-terms.php:39
filteralm_terms_preloadedajax-load-more-for-terms.php:40
Maintenance & Trust

Ajax Load More for Terms Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedNov 13, 2025
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Ajax Load More for Terms Developer Profile

Darren Cooney

9 plugins · 47K total installs

78
trust score
Avg Security Score
98/100
Avg Patch Time
629 days
View full developer profile
Detection Fingerprints

How We Detect Ajax Load More for Terms

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/wp-json/alm-terms/v1/data
FAQ

Frequently Asked Questions about Ajax Load More for Terms