
Read More Function Security & Risk Analysis
wordpress.org/plugins/readmoreEasy configuration of readable content in article listing.
Is Read More Function Safe to Use in 2026?
Generally Safe
Score 85/100Read More Function has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "readmore" plugin v1.1 exhibits a generally good security posture regarding its attack surface and vulnerability history. There are no reported CVEs, and the static analysis indicates no direct entry points like AJAX handlers, REST API routes, or shortcodes that are immediately exploitable. Furthermore, the plugin shows adherence to secure coding practices by exclusively using prepared statements for SQL queries, which mitigates common SQL injection risks.
However, there are significant concerns stemming from the output escaping. The analysis reveals that 100% of the identified output points are not properly escaped. This is a critical weakness, as unescaped output can lead to Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website, which can then be executed in the browsers of other users. The taint analysis also identified two flows with unsanitized paths, although they were not flagged as critical or high severity. This, combined with the lack of capability checks, suggests a potential for unauthorized actions if these unsanitized paths are ever triggered through a discovered input vector.
In conclusion, while the plugin avoids common pitfalls like direct SQL injection and has a clean vulnerability history, the complete lack of output escaping represents a serious security deficiency. The absence of capability checks and the presence of unsanitized paths, even if not immediately exploitable, indicate areas that require immediate attention to prevent potential XSS and privilege escalation vulnerabilities. The strengths lie in the managed SQL and absence of historical vulnerabilities, but the weaknesses in output sanitization are a significant risk.
Key Concerns
- 100% of output points are not properly escaped
- 2 flows with unsanitized paths
- No capability checks found
Read More Function Security Vulnerabilities
Read More Function Code Analysis
Output Escaping
Data Flow Analysis
Read More Function Attack Surface
WordPress Hooks 2
Maintenance & Trust
Read More Function Maintenance & Trust
Maintenance Signals
Community Trust
Read More Function Alternatives
ReadMore ReadLess
readmore-readless
ReadMore ReadLess will hide content on page. Clicking on readmore will show complete page without refreshing the page.
Yoast SEO – Advanced SEO with real-time guidance and built-in AI
wordpress-seo
Improve your SEO with real-time feedback, schema, and clear guidance. Upgrade for AI tools, Google Docs integration, and 24/7 support, no hidden fees.
Custom Post Type UI
custom-post-type-ui
Admin UI for creating custom content types like post types and taxonomies
One Click Demo Import
one-click-demo-import
Import your demo content, widgets and theme settings with one click. Theme authors! Enable simple theme demo import for your users.
Easy Table of Contents
easy-table-of-contents
Adds a user friendly and fully automatic way to create and display a table of contents generated from the page content.
Read More Function Developer Profile
1 plugin · 20 total installs
How We Detect Read More Function
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
<a href="">weiterlesen</a>">Titel</a>">benutzerdefiniert</a>