TTT Loadmore Security & Risk Analysis

wordpress.org/plugins/ttt-loadmore

WordPress plugin to load more event with your own template.

10 active installs v1.1.1 PHP + WP 3.7+ Updated Sep 14, 2015
core-paginationloadmorepaginationposts-paginationvertical-pagination
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is TTT Loadmore Safe to Use in 2026?

Generally Safe

Score 85/100

TTT Loadmore has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "ttt-loadmore" plugin v1.1.1 exhibits a mixed security posture. On the positive side, the code analysis reveals good development practices such as the complete absence of dangerous functions, a 100% usage of prepared statements for SQL queries, and 100% properly escaped output. There are no file operations, external HTTP requests, or bundled libraries, which reduces the potential attack surface from these vectors. The vulnerability history is also clear, with no recorded CVEs, indicating a potentially stable and well-maintained codebase regarding past exploits.

However, a significant concern arises from the static analysis of the attack surface. The plugin exposes two AJAX handlers, both of which lack any authentication or capability checks. This means any unauthenticated user can trigger these AJAX actions, opening a direct pathway for potential abuse. The absence of nonces further exacerbates this issue, as it allows for Cross-Site Request Forgery (CSRF) attacks against these unprotected AJAX endpoints. While taint analysis shows no critical or high severity unsanitized flows, the lack of authentication on such prominent entry points is a critical oversight.

In conclusion, while the plugin demonstrates strong internal coding hygiene for SQL and output handling, the severe lack of security checks on its AJAX endpoints represents a substantial risk. The absence of nonces and capability checks on these two entry points makes them prime targets for unauthorized actions. This weakness outweighs the otherwise positive aspects of the code's internal security, making it a significant concern.

Key Concerns

  • 2 AJAX handlers without auth checks
  • 0 Nonce checks on AJAX handlers
Vulnerabilities
None known

TTT Loadmore Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

TTT Loadmore Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface
2 unprotected

TTT Loadmore Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_ttt-loadmoreclass\TTTLoadmore_Common.php:23
noprivwp_ajax_ttt-loadmoreclass\TTTLoadmore_Common.php:24
WordPress Hooks 1
actioninitttt-loadmore.php:48
Maintenance & Trust

TTT Loadmore Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedSep 14, 2015
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

TTT Loadmore Developer Profile

gabrielperezs

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect TTT Loadmore

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ttt-loadmore/template/front/js/loadmore.js
Script Paths
wp-content/plugins/ttt-loadmore/template/front/js/loadmore.js
Version Parameters
ttt-loadmore/template/front/js/loadmore.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-tttloadmore
JS Globals
tttloadmoreConf
FAQ

Frequently Asked Questions about TTT Loadmore