ReadMore ReadLess Security & Risk Analysis

wordpress.org/plugins/readmore-readless

ReadMore ReadLess will hide content on page. Clicking on readmore will show complete page without refreshing the page.

90 active installs v1.0 PHP + WP 3.0.1+ Updated Sep 3, 2014
content-lockerdisplay-morehide-contentread-morereadmore
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is ReadMore ReadLess Safe to Use in 2026?

Generally Safe

Score 85/100

ReadMore ReadLess has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'readmore-readless' v1.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any recorded vulnerabilities (CVEs) and the plugin's clean vulnerability history are positive indicators. The code analysis shows a commendable adherence to security best practices, with no dangerous functions, SQL queries fully utilizing prepared statements, and a single nonce check and capability check present. There are also no detected taint flows, indicating a lack of obvious pathways for malicious data injection.

However, there is a minor concern regarding output escaping, where 40% of the outputs are not properly escaped. While the attack surface is reported as zero, this could still lead to cross-site scripting (XSS) vulnerabilities if unescaped output contains user-supplied data. The plugin also has no file operations or external HTTP requests, which further reduces potential attack vectors. The complete lack of AJAX handlers, REST API routes, shortcodes, and cron events also contributes to a minimal attack surface. Overall, the plugin is well-secured, with the primary area for improvement being the consistent proper escaping of all output.

Key Concerns

  • Unescaped output identified
Vulnerabilities
None known

ReadMore ReadLess Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ReadMore ReadLess Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
3 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

60% escaped5 total outputs
Attack Surface

ReadMore ReadLess Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionsave_postreadmore-readless.php:12
actionadd_meta_boxesreadmore-readless.php:41
actioninitreadmore-readless.php:71
actionwp_footerreadmore-readless.php:100
Maintenance & Trust

ReadMore ReadLess Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedSep 3, 2014
PHP min version
Downloads8K

Community Trust

Rating74/100
Number of ratings3
Active installs90
Developer Profile

ReadMore ReadLess Developer Profile

Brijesh Mishra

3 plugins · 350 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ReadMore ReadLess

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/readmore-readless/js/readmore.min.js
Script Paths
/wp-content/plugins/readmore-readless/js/readmore.min.js

HTML / DOM Fingerprints

Data Attributes
id="rmrl_meta_box_text"
JS Globals
jQuery
FAQ

Frequently Asked Questions about ReadMore ReadLess