
No More Frames Security & Risk Analysis
wordpress.org/plugins/no-more-framesMany web sites try to load your content into their own frame, to help sell ads on their sites. This plugin reloads sites such as Google images, forcin …
Is No More Frames Safe to Use in 2026?
Generally Safe
Score 85/100No More Frames has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "no-more-frames" v2017.08.13 plugin exhibits a generally positive security posture based on the provided static analysis. The absence of any recorded vulnerabilities (CVEs) and the clean taint analysis suggest a low risk of known exploits. Furthermore, the code demonstrates good practices by not utilizing dangerous functions, all SQL queries being prepared, and no file operations or external HTTP requests being present. This indicates a limited attack surface and careful coding in these areas.
However, a significant concern arises from the complete lack of output escaping. With one output identified and zero percent properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data rendered to the user interface that originates from user input or other potentially untrusted sources could be maliciously manipulated. Additionally, the absence of any nonce or capability checks, even though the attack surface appears minimal (0 AJAX, REST API, shortcodes, or cron events), means that if any such entry points were to be introduced in the future without proper authentication and authorization, they would be entirely unprotected.
In conclusion, while the plugin has a history of being clean and avoids many common pitfalls, the unescaped output is a critical weakness that significantly increases the risk of exploitation. The lack of any security checks on potential entry points also represents a latent risk. Developers should prioritize addressing the output escaping issue immediately and consider implementing basic capability checks on any future additions to the plugin's functionality.
Key Concerns
- Output not properly escaped
- Missing nonce checks
- Missing capability checks
No More Frames Security Vulnerabilities
No More Frames Code Analysis
Output Escaping
No More Frames Attack Surface
WordPress Hooks 1
Maintenance & Trust
No More Frames Maintenance & Trust
Maintenance Signals
Community Trust
No More Frames Alternatives
Share on Mastodon
share-on-mastodon
Automatically share WordPress posts on Mastodon.
WP REST Yoast Meta
wp-rest-yoast-meta
Adds meta tags as generated by Yoast SEO to the WP REST API. And adds a custom endpoint to retrieve all redirects as they are set in Yoast SEO Premium …
Divi Title Module
mc-divi-title-module
This plugin adds a new module to the Divi builder, it allows to easily insert titles without going through the text module.
Share on Pixelfed
share-on-pixelfed
Automatically share WordPress (image) posts on Pixelfed.
Add Image to RSS Feed
add-image-to-rss-feed
** this plugin is no longer being update. Please feel free to adopt me! **
No More Frames Developer Profile
17 plugins · 130 total installs
How We Detect No More Frames
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/no-more-frames/horshipsrectors-common.phpHTML / DOM Fingerprints
<!-- No More Frames ( start ) --><!-- No More Frames ( end ) -->parent_locationtop_locationcur_location