CFS Font Awesome Security & Risk Analysis

wordpress.org/plugins/cfs-font-awesome

Font Awesome Field for Custom Field Suite

90 active installs v1.0.0 PHP + WP 3.9+ Updated Apr 19, 2016
cfscustom-field-suitefield-typefont-awesome
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CFS Font Awesome Safe to Use in 2026?

Generally Safe

Score 85/100

CFS Font Awesome has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "cfs-font-awesome" plugin, version 1.0.0, exhibits a strong adherence to secure coding practices in several key areas. The static analysis reveals a complete absence of dangerous functions, SQL queries executed with prepared statements, file operations, external HTTP requests, and any indication of taint flows. This suggests a well-structured codebase with a minimal attack surface. Furthermore, the plugin has no recorded vulnerabilities, CVEs, or history of past security issues, which is a very positive sign of its stability and developer attention to security.

However, a significant concern arises from the complete lack of output escaping. With one output identified in the static analysis, and 0% of it being properly escaped, any data rendered to the user interface could be vulnerable to cross-site scripting (XSS) attacks. Additionally, the absence of nonce and capability checks across all identified entry points (though the attack surface is currently zero) means that if any new entry points are introduced in future updates without proper security measures, they would be immediately unprotected. The overall security posture is good due to the absence of critical vulnerabilities and good SQL handling, but the unescaped output represents a tangible risk that needs immediate attention.

Key Concerns

  • 1 total output, 0% properly escaped
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

CFS Font Awesome Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CFS Font Awesome Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

CFS Font Awesome Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_initcfs-font-awesome-field.php:7
filtercfs_field_typescfs-font-awesome.php:37
Maintenance & Trust

CFS Font Awesome Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedApr 19, 2016
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings2
Active installs90
Developer Profile

CFS Font Awesome Developer Profile

Chetan Prajapati

2 plugins · 190 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CFS Font Awesome

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cfs-font-awesome/assets/css/fontawesome-iconpicker.min.css/wp-content/plugins/cfs-font-awesome/assets/js/fontawesome-iconpicker.min.js

HTML / DOM Fingerprints

CSS Classes
cfsfa_wrapicpicp-autoiconpicker-item
Data Attributes
name="font_awesome_field"
Shortcode Output
<div class="cfsfa_wrap"><span id="fa_icon" class="input-group-addon"></span><input class="icp icp-auto" name="font_awesome_field" value="
FAQ

Frequently Asked Questions about CFS Font Awesome