oik-read-more Security & Risk Analysis

wordpress.org/plugins/oik-read-more

Progressively reveal content by clicking on "read more" buttons.

10 active installs v0.2.6 PHP + WP 3.9+ Updated Nov 14, 2024
oikshortcodebw_more
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is oik-read-more Safe to Use in 2026?

Generally Safe

Score 92/100

oik-read-more has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "oik-read-more" plugin, version 0.2.6, presents a mixed security profile. On the positive side, there are no known CVEs, a clean vulnerability history, and the static analysis reveals a lack of dangerous functions, file operations, external HTTP requests, and external code execution opportunities. The plugin also does not appear to utilize any bundled libraries, which can sometimes introduce vulnerabilities. The absence of SQL queries using prepared statements is a strong indicator of good database security practices.

However, significant concerns arise from the output escaping analysis and the complete absence of security checks. The static analysis indicates that 100% of output is not properly escaped, which is a critical vulnerability. This means that any data rendered to the user, if it originates from user input or external sources, could be susceptible to Cross-Site Scripting (XSS) attacks. Furthermore, the complete lack of nonce checks and capability checks across all entry points (AJAX, REST API, shortcodes, cron) is highly alarming, as it suggests no authentication or authorization mechanisms are in place for these potential interaction points. The lack of taint analysis results is also noted, making it difficult to assess the flow of potentially malicious data.

In conclusion, while the plugin avoids common pitfalls like unpatched CVEs and dangerous functions, the lack of output escaping and authorization checks creates a substantial security risk, particularly for XSS vulnerabilities. The plugin's strengths lie in its clean history and careful database interaction, but these are overshadowed by critical weaknesses in how it handles user-facing output and secures its interaction points.

Key Concerns

  • 100% of outputs are not properly escaped
  • 0 nonce checks on entry points
  • 0 capability checks on entry points
Vulnerabilities
None known

oik-read-more Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

oik-read-more Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

oik-read-more Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionoik_add_shortcodesoik-read-more.php:41
actionafter_plugin_row_oik-read-more/oik-read-more.phpoik-read-more.php:51
actionadmin_noticesoik-read-more.php:64
actionoik_loadedoik-read-more.php:65
filterthe_contentshortcodes\oik-read-more.php:42
Maintenance & Trust

oik-read-more Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 14, 2024
PHP min version
Downloads8K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

oik-read-more Developer Profile

bobbingwide

16 plugins · 7K total installs

92
trust score
Avg Security Score
97/100
Avg Patch Time
15 days
View full developer profile
Detection Fingerprints

How We Detect oik-read-more

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[bw_more]
FAQ

Frequently Asked Questions about oik-read-more