Evermore Security & Risk Analysis

wordpress.org/plugins/evermore

Evermore automatically abbreviates all posts when they appear on a multiple-post page such as the main blog page.

1K active installs v2.5 PHP + WP 3.0+ Updated Jan 26, 2026
abbreviateextractmorepreviewshort
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Evermore Safe to Use in 2026?

Generally Safe

Score 100/100

Evermore has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The static analysis of the 'evermore' plugin v2.5 reveals an exceptionally clean codebase with no identified attack vectors like AJAX handlers, REST API routes, shortcodes, or cron events that are accessible to unauthenticated users. The plugin also demonstrates good practices in its handling of SQL queries, exclusively using prepared statements, and has a significant majority of its output properly escaped. The presence of a nonce check further adds to its security posture. However, a concerning aspect is the complete absence of capability checks, which means that even authenticated users with potentially limited privileges could theoretically interact with any of the plugin's internal functions if an entry point were ever discovered. The vulnerability history is also remarkably clear, with no recorded CVEs, indicating a strong track record. While the current analysis shows no overt critical flaws, the lack of capability checks represents a potential weakness that could be exploited if other security measures were bypassed or if new attack surfaces were introduced in future versions.

Key Concerns

  • Missing capability checks
  • Unescaped output detected
Vulnerabilities
None known

Evermore Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Evermore Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
6 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped8 total outputs
Attack Surface

Evermore Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterthe_postsevermore.php:67
actionadmin_menuevermore.php:69
Maintenance & Trust

Evermore Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 26, 2026
PHP min version
Downloads96K

Community Trust

Rating100/100
Number of ratings5
Active installs1K
Developer Profile

Evermore Developer Profile

bennettmcelwee

6 plugins · 22K total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
1413 days
View full developer profile
Detection Fingerprints

How We Detect Evermore

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!--more--><!--nevermore--><!-- -->
FAQ

Frequently Asked Questions about Evermore