JVM Read More Block Security & Risk Analysis

wordpress.org/plugins/jvm-read-more-block

A lightweight Gutenberg block that lets you toggle extra content with "Read more" and "Read less" buttons. No CSS markup is added.

0 active installs v1.0 PHP 7.4+ WP 6.0+ Updated Sep 3, 2025
blockcollapsibleexpandgutenbergtoggle
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is JVM Read More Block Safe to Use in 2026?

Generally Safe

Score 100/100

JVM Read More Block has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7mo ago
Risk Assessment

The static analysis of the "jvm-read-more-block" plugin v1.0 reveals an exceptionally clean code base with no identified attack surface, dangerous functions, or insecure data handling patterns. All SQL queries utilize prepared statements, and output is consistently escaped, indicating strong adherence to secure coding best practices in these areas. The absence of file operations, external HTTP requests, and any identified taint flows further solidifies this positive assessment. The plugin's vulnerability history is also entirely clear, with no recorded CVEs, suggesting a mature and well-maintained codebase or minimal exposure.

While the plugin exhibits excellent security hygiene in its current state, the complete lack of entry points, including AJAX handlers, REST API routes, shortcodes, and cron events, is a notable observation. This could mean the plugin offers very limited functionality or relies entirely on its block editor integration. The absence of nonce and capability checks, while not a direct vulnerability given the current lack of entry points, represents a potential future risk if functionality is added without corresponding security measures. Overall, "jvm-read-more-block" v1.0 appears to be highly secure based on the provided data, with its main potential weakness lying in the possibility of future development introducing vulnerabilities if best practices are not maintained.

Key Concerns

  • No Nonce checks found
  • No Capability checks found
Vulnerabilities
None known

JVM Read More Block Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

JVM Read More Block Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

JVM Read More Block Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitjvm-read-more-block.php:18
actionwp_enqueue_scriptsjvm-read-more-block.php:19
Maintenance & Trust

JVM Read More Block Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedSep 3, 2025
PHP min version7.4
Downloads198

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

JVM Read More Block Developer Profile

Joris van Montfort

5 plugins · 4K total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
27 days
View full developer profile
Detection Fingerprints

How We Detect JVM Read More Block

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/jvm-read-more-block/build/index.js/wp-content/plugins/jvm-read-more-block/frontend.js
Script Paths
jvm-read-more-blockjvm-read-more-frontend
Version Parameters
jvm-read-more-block?ver=frontend.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about JVM Read More Block