Cache Google Web Font Security & Risk Analysis

wordpress.org/plugins/cache-google-font

This plugin will cache google web font to local files.

10 active installs v1.3 PHP + WP 2.8+ Updated Sep 20, 2014
cachegoogleweb-font
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Cache Google Web Font Safe to Use in 2026?

Generally Safe

Score 85/100

Cache Google Web Font has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The cache-google-font plugin v1.3 exhibits a mixed security posture. While the plugin's attack surface appears minimal with no identified AJAX handlers, REST API routes, shortcodes, or cron events, this also implies limited functionality and thus fewer opportunities for direct exploitation. The absence of known CVEs and historical vulnerabilities is a positive indicator, suggesting a generally stable and secure development history. However, significant concerns arise from the code analysis. The fact that 100% of the identified SQL queries utilize prepared statements is excellent. Conversely, a complete lack of output escaping (0% properly escaped) is a critical vulnerability, potentially leading to cross-site scripting (XSS) attacks if any user-controlled data is ever reflected in the output. The presence of file operations and external HTTP requests, while not inherently insecure, warrants careful review in conjunction with the lack of capability checks or nonces, as these could become vectors for further compromise if not handled with extreme caution. The absence of taint analysis results is neutral; it may mean no flows were found or the analysis tools were not comprehensive enough.

Key Concerns

  • All output is unescaped, risking XSS attacks.
  • No capability checks on potential sensitive operations.
  • No nonce checks on potential sensitive operations.
Vulnerabilities
None known

Cache Google Web Font Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Cache Google Web Font Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
6
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped9 total outputs
Attack Surface

Cache Google Web Font Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_noticescache_fonts.php:33
filterstyle_loader_srccache_fonts.php:248
actionadmin_menucache_fonts.php:250
actionadmin_initcache_fonts.php:278
Maintenance & Trust

Cache Google Web Font Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.0
Last updatedSep 20, 2014
PHP min version
Downloads3K

Community Trust

Rating40/100
Number of ratings2
Active installs10
Developer Profile

Cache Google Web Font Developer Profile

caijiamx

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cache Google Web Font

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cache-google-font/font.css/wp-content/plugins/cache-google-font/font.ttf

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Cache Google Web Font