No More Frames Security & Risk Analysis

wordpress.org/plugins/no-more-frames

Many web sites try to load your content into their own frame, to help sell ads on their sites. This plugin reloads sites such as Google images, forcin …

10 active installs v2017.08.13 PHP + WP 4.0.0+ Updated Jul 13, 2017
adopt-me
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is No More Frames Safe to Use in 2026?

Generally Safe

Score 85/100

No More Frames has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "no-more-frames" v2017.08.13 plugin exhibits a generally positive security posture based on the provided static analysis. The absence of any recorded vulnerabilities (CVEs) and the clean taint analysis suggest a low risk of known exploits. Furthermore, the code demonstrates good practices by not utilizing dangerous functions, all SQL queries being prepared, and no file operations or external HTTP requests being present. This indicates a limited attack surface and careful coding in these areas.

However, a significant concern arises from the complete lack of output escaping. With one output identified and zero percent properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data rendered to the user interface that originates from user input or other potentially untrusted sources could be maliciously manipulated. Additionally, the absence of any nonce or capability checks, even though the attack surface appears minimal (0 AJAX, REST API, shortcodes, or cron events), means that if any such entry points were to be introduced in the future without proper authentication and authorization, they would be entirely unprotected.

In conclusion, while the plugin has a history of being clean and avoids many common pitfalls, the unescaped output is a critical weakness that significantly increases the risk of exploitation. The lack of any security checks on potential entry points also represents a latent risk. Developers should prioritize addressing the output escaping issue immediately and consider implementing basic capability checks on any future additions to the plugin's functionality.

Key Concerns

  • Output not properly escaped
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

No More Frames Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

No More Frames Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

No More Frames Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterwp_footerno-more-frames.php:71
Maintenance & Trust

No More Frames Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.0
Last updatedJul 13, 2017
PHP min version
Downloads60K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

No More Frames Developer Profile

klickonit

17 plugins · 130 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect No More Frames

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/no-more-frames/horshipsrectors-common.php

HTML / DOM Fingerprints

HTML Comments
<!-- No More Frames ( start ) --><!-- No More Frames ( end ) -->
JS Globals
parent_locationtop_locationcur_location
FAQ

Frequently Asked Questions about No More Frames