Enlarge Text Security & Risk Analysis

wordpress.org/plugins/enlarge-text

Give your users a widget to enlarge the text on your site.

80 active installs v2.0 PHP + WP 2.9+ Updated Sep 4, 2015
enlarge-texttext-resizetext-sizer
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Enlarge Text Safe to Use in 2026?

Generally Safe

Score 85/100

Enlarge Text has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "enlarge-text" plugin v2.0 demonstrates a generally good security posture, with no known vulnerabilities or critical code signals indicating immediate threats. The absence of dangerous functions, file operations, external HTTP requests, and the exclusive use of prepared statements for SQL queries are strong indicators of secure coding practices. The plugin also boasts a small attack surface with only one entry point (a shortcode), and importantly, this entry point is not explicitly flagged as unprotected. Taint analysis further reinforces this positive outlook, revealing no critical or high severity flows with unsanitized paths.

However, there are areas that warrant attention. The static analysis reports zero capability checks and zero nonce checks. While the entry point isn't flagged as unprotected, the complete lack of capability checks on any potential interaction points means that the plugin isn't leveraging WordPress's built-in access control mechanisms. This could become a concern if the plugin's functionality were to be expanded in the future or if a more complex attack vector were discovered. The fact that 27% of output is not properly escaped also presents a minor risk of cross-site scripting (XSS) vulnerabilities, although the absence of known CVEs and critical taint flows suggests this might be a low-impact risk in the current implementation.

Overall, "enlarge-text" v2.0 appears to be a secure plugin for its current functionality, especially given its clean vulnerability history. The development team seems to adhere to good practices for common web vulnerabilities like SQL injection. The primary weaknesses lie in the missed opportunities to implement robust WordPress security features like capability checks and the minor concern regarding unescaped output. These are not critical flaws in the current version, but they represent potential areas for improvement to further harden the plugin's security.

Key Concerns

  • No capability checks implemented
  • No nonce checks implemented
  • Unescaped output present (27%)
Vulnerabilities
None known

Enlarge Text Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Enlarge Text Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
11 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

73% escaped15 total outputs
Attack Surface

Enlarge Text Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[enlarge_text] inc\class.shortcode.php:15
WordPress Hooks 7
actioninitinc\class.enqueue.php:10
actionwp_enqueue_scriptsinc\class.enqueue.php:15
actioninitinc\class.js.php:10
actionwp_headinc\class.js.php:15
actioninitinc\class.shortcode.php:10
actionwidgets_initinc\class.widget.php:10
actionadmin_headinc\class.widget.php:34
Maintenance & Trust

Enlarge Text Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedSep 4, 2015
PHP min version
Downloads8K

Community Trust

Rating60/100
Number of ratings1
Active installs80
Developer Profile

Enlarge Text Developer Profile

Scott Fennell

4 plugins · 120 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Enlarge Text

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/enlarge-text/inc/class.enqueue.php/wp-content/plugins/enlarge-text/inc/class.js.php/wp-content/plugins/enlarge-text/inc/class.shortcode.php/wp-content/plugins/enlarge-text/inc/class.sizes.php/wp-content/plugins/enlarge-text/inc/class.widget.php

HTML / DOM Fingerprints

CSS Classes
sjf-enlarge_text-changersjf_et_activeactive
HTML Comments
Added by Enlarge Text
Data Attributes
data-sjf-enlarge_text-is_defaultdata-sjf-enlarge_text-size_multiplier
JS Globals
jQuerywindowgetCookiesetCookiesetSizegetSize+7 more
FAQ

Frequently Asked Questions about Enlarge Text