Read More Excerpt Link Security & Risk Analysis

wordpress.org/plugins/read-more-excerpt-link

Create "Read More" link after post excerpt instead of ellipsis [...] Also modify excerpt length.

3K active installs v1.6.1 PHP + WP 2.9.0+ Updated Jan 30, 2026
ellipsisexcerptlinkmoreread
99
A · Safe
CVEs total2
Unpatched0
Last CVEFeb 27, 2023
Safety Verdict

Is Read More Excerpt Link Safe to Use in 2026?

Generally Safe

Score 99/100

Read More Excerpt Link has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Feb 27, 2023Updated 2mo ago
Risk Assessment

The plugin 'read-more-excerpt-link' v1.6.1 exhibits a mixed security posture. While the static analysis reveals no identified critical or high-severity taint flows, a lack of dangerous functions, and proper use of prepared statements for SQL queries are positive indicators. The presence of nonce and capability checks suggests an awareness of basic security principles. However, a significant concern is the low percentage of properly escaped output (33%), which could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled carefully within the plugin's frontend or backend outputs. The vulnerability history is a major red flag; two medium-severity CVEs, though currently patched, indicate a pattern of past security weaknesses. The common vulnerability type being CSRF also points to potential issues with how user actions are authenticated and authorized. While the current version appears to have addressed past vulnerabilities, the history suggests a need for ongoing vigilance and more robust output sanitization to prevent future exploitable issues.

Key Concerns

  • Medium severity CVEs in vulnerability history
  • Low percentage of properly escaped output (33%)
  • Past CSRF vulnerabilities
Vulnerabilities
2

Read More Excerpt Link Security Vulnerabilities

CVEs by Year

2 CVEs in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2023-1068medium · 4.3Cross-Site Request Forgery (CSRF)

Download Read More Excerpt Link <= 1.6.0 - Cross-Site Request Forgery to Settings Update

Feb 27, 2023 Patched in 1.6.1 (330d)
CVE-2023-26011medium · 4.3Cross-Site Request Forgery (CSRF)

Read More Excerpt Link <= 1.5 - Cross-Site Request Forgery

Feb 21, 2023 Patched in 1.6.1 (336d)
Code Analysis
Analyzed Mar 16, 2026

Read More Excerpt Link Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
4 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped12 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
read_more_excerpt_link_menu_options (read-more-excerpt-link.php:73)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Read More Excerpt Link Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterexcerpt_moreread-more-excerpt-link.php:40
filterget_the_excerptread-more-excerpt-link.php:57
actioninitread-more-excerpt-link.php:59
actionadmin_menuread-more-excerpt-link.php:64
filterexcerpt_lengthread-more-excerpt-link.php:71
Maintenance & Trust

Read More Excerpt Link Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 30, 2026
PHP min version
Downloads65K

Community Trust

Rating100/100
Number of ratings6
Active installs3K
Developer Profile

Read More Excerpt Link Developer Profile

Tim Eckel

3 plugins · 14K total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
201 days
View full developer profile
Detection Fingerprints

How We Detect Read More Excerpt Link

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
read-more-link
FAQ

Frequently Asked Questions about Read More Excerpt Link