iFrame-less Reloaded Security & Risk Analysis

wordpress.org/plugins/iframe-less-reloaded

iFrame-less Reloaded plugin is a simple and SEO friendly way to embed non-PHP dynamic content directly onto a wordpress page.

10 active installs v0.0.1 PHP + WP 2.8+ Updated Unknown
iframe
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is iFrame-less Reloaded Safe to Use in 2026?

Generally Safe

Score 100/100

iFrame-less Reloaded has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'iframe-less-reloaded' plugin v0.0.1 presents a mixed security posture. On the positive side, the static analysis reveals a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events exposed without authorization. Furthermore, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are good practices. However, significant concerns arise from the use of the `create_function` dangerous function. While taint analysis shows no obvious unsanitized flows, the presence of this function is a known security risk as it can lead to arbitrary code execution if not handled with extreme care, especially when processing user-supplied data.

The lack of any vulnerability history, including CVEs, might suggest a relatively secure past or a lack of targeted research. However, this should not be solely relied upon, as new vulnerabilities can emerge. The plugin also exhibits poor output escaping practices, with only 13% of outputs being properly escaped, which opens the door to Cross-Site Scripting (XSS) vulnerabilities if user-controlled data is ever rendered directly on a page.

In conclusion, while the plugin has a minimal attack surface and good database query practices, the presence of `create_function` and the poor output escaping are critical weaknesses. These, combined with the absence of nonce and capability checks, create potential security risks that require attention. The lack of historical vulnerabilities is encouraging but doesn't negate the immediate coding concerns.

Key Concerns

  • Dangerous function create_function used
  • Low percentage of properly escaped output
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

iFrame-less Reloaded Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

iFrame-less Reloaded Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
7
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("gingerIFrameless");'));iframe-less-reloaded.php:64

Output Escaping

13% escaped8 total outputs
Attack Surface

iFrame-less Reloaded Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initiframe-less-reloaded.php:64
Maintenance & Trust

iFrame-less Reloaded Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedUnknown
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

iFrame-less Reloaded Developer Profile

toddhalfpenny

9 plugins · 21K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
371 days
View full developer profile
Detection Fingerprints

How We Detect iFrame-less Reloaded

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/iframe-less-reloaded/readme.txt

HTML / DOM Fingerprints

Data Attributes
id="widget-gingerIFrameless-url"
FAQ

Frequently Asked Questions about iFrame-less Reloaded