
Elegant Custom Fonts Security & Risk Analysis
wordpress.org/plugins/elegant-custom-fontsA simple solution for self-hosted custom fonts.
Is Elegant Custom Fonts Safe to Use in 2026?
Generally Safe
Score 85/100Elegant Custom Fonts has a strong security track record. Known vulnerabilities have been patched promptly.
The "elegant-custom-fonts" plugin v1.0.1 exhibits a mixed security posture. On one hand, the static analysis reveals a commendable lack of direct entry points like AJAX handlers, REST API routes, or shortcodes that are exposed without authentication. Furthermore, all SQL queries are properly prepared, which is a significant strength in preventing SQL injection vulnerabilities. However, concerns arise from the presence of dangerous functions, specifically `unserialize`, which, if not handled with extreme caution and validation, can lead to deserialization vulnerabilities. The relatively low percentage of properly escaped output (36%) also indicates potential for cross-site scripting (XSS) vulnerabilities, as data displayed to users might not be adequately sanitized.
The vulnerability history shows a past medium-severity CVE, primarily related to Cross-Site Request Forgery (CSRF). While there are no currently unpatched vulnerabilities, the existence of a past CSRF issue, coupled with the lack of capability checks in the static analysis, suggests that input validation and permission checks might be areas requiring improvement. The absence of taint analysis results is noted, but the identified code signals, particularly `unserialize` and the low output escaping rate, represent tangible risks that need attention. Overall, the plugin has a solid foundation in terms of attack surface and SQL security, but the identified code signals and historical vulnerability warrant careful consideration and potential remediation to enhance its security.
Key Concerns
- Dangerous function unserialize found
- Low output escaping percentage (36%)
- Past medium severity CVE (CSRF)
- No capability checks found
Elegant Custom Fonts Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Elegant Custom Fonts <= 1.0 - Cross-Site Request Forgery
Elegant Custom Fonts Code Analysis
Dangerous Functions Found
Output Escaping
Elegant Custom Fonts Attack Surface
WordPress Hooks 2
Maintenance & Trust
Elegant Custom Fonts Maintenance & Trust
Maintenance Signals
Community Trust
Elegant Custom Fonts Alternatives
Fontify
fontify
Upload and apply custom fonts (WOFF or WOFF2) to your entire WordPress site, including admin panel — without writing code.
Custom Fonts For Beaver Builder
custom-fonts-for-beaver-builder
A simple solution for self-hosted custom fonts with Beaver Builder. https://www.youtube.com/watch?v=UU6IYikNPuI
Use Any Font | Custom Font Uploader
use-any-font
Upload custom fonts with custom font uploader. Auto converts to woff2 for better performance. Self-hosted, GDPR compliant, and easy custom font plugin
Seed Fonts
seed-fonts
Use web fonts (@font-face) by choosing from Google Fonts, Bundled Thai-English fonts, and your own web fonts.
SafeFonts
safefonts
Host custom fonts locally in WordPress with advanced security validation, block editor integration, and CSS variables support.
Elegant Custom Fonts Developer Profile
2 plugins · 3K total installs
How We Detect Elegant Custom Fonts
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/elegant-custom-fonts/ecf.cssHTML / DOM Fingerprints
ecf-admin-fontcard-toprowecf-admin-add-font-face-formecf-font-face-rulesecf-admin-add-font-family-formecf-font-face-rules preecf-add-font-face-toggle-buttonecf-view-font-face-rules-toggle-buttonecf-add-font-family-button+1 moreinline styles cause that's how i roll sometimes.
don't hate.
inline scripts too cause that's how i roll sometimes.
don't hate.
Dear User,
Before you <a href='#' class='ecf-add-font-family-button'>add your first font family</a>, do you know what makes a website look elegant?
+3 morefor="font_family_name"jQuery