Unlimited Security & Risk Analysis

wordpress.org/plugins/unlimited

Inifinite scrolling plugin. Choose from Load on scroll, Load more button and Ajax Pagination. Includes scroll to top and opt-out button.

10 active installs v0.5 PHP + WP 3.5+ Updated Oct 6, 2015
ajax-paginationinfinite-scrollingnextpageprevious
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Unlimited Safe to Use in 2026?

Generally Safe

Score 85/100

Unlimited has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "unlimited" v0.5 plugin presents a significant security risk due to its unprotected AJAX handlers. While the plugin shows good practices by not using dangerous functions, avoiding raw SQL queries, and having no known vulnerability history, the presence of three AJAX handlers without any authentication or capability checks is a major concern. This creates a large attack surface that could be exploited by unauthenticated users to execute arbitrary actions within the WordPress site.

The static analysis reveals no critical or high-severity taint flows, which is a positive sign. However, the lack of proper output escaping on half of the detected outputs is also a point of weakness, potentially leading to cross-site scripting (XSS) vulnerabilities. The absence of nonce checks on these AJAX handlers further exacerbates the risk, as it allows for easy cross-site request forgery (CSRF) attacks.

Overall, the plugin's security posture is mixed. It demonstrates some good development practices, but the critical oversight of leaving AJAX endpoints exposed without proper authorization and sanitization makes it vulnerable to exploitation. The lack of historical vulnerabilities is encouraging, but it doesn't negate the immediate risks identified in the current code. Users should be cautious, and developers should prioritize addressing the unprotected AJAX handlers and output escaping issues.

Key Concerns

  • Unprotected AJAX handlers
  • Missing nonce checks on AJAX
  • Unescaped output
Vulnerabilities
None known

Unlimited Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Unlimited Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped6 total outputs
Attack Surface
3 unprotected

Unlimited Attack Surface

Entry Points3
Unprotected3

AJAX Handlers 3

authwp_ajax_pb_un_getunlimited.php:25
authwp_ajax_pb_un_saveunlimited.php:26
authwp_ajax_pb_un_deleteunlimited.php:27
WordPress Hooks 4
actionadmin_menuunlimited.php:19
actionadmin_enqueue_scriptsunlimited.php:21
actionwp_enqueue_scriptsunlimited.php:22
actionplugins_loadedunlimited.php:23
Maintenance & Trust

Unlimited Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedOct 6, 2015
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Unlimited Developer Profile

plugin.builders

5 plugins · 10K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
279 days
View full developer profile
Detection Fingerprints

How We Detect Unlimited

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/unlimited/css/dash.css/wp-content/plugins/unlimited/js/settings.js
Script Paths
/wp-content/plugins/unlimited/js/un.js
Version Parameters
unlimited/css/dash.css?ver=unlimited/js/settings.js?ver=unlimited/css/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
pb-un-wrapperpb-un-itemspb-un-editorpbc-feedback
Data Attributes
data-themedata-site
JS Globals
unlimited_server_values
REST Endpoints
/wp-admin/admin-ajax.php?action=pb_un_get/wp-admin/admin-ajax.php?action=pb_un_save/wp-admin/admin-ajax.php?action=pb_un_delete
FAQ

Frequently Asked Questions about Unlimited