
Enlarge Text Security & Risk Analysis
wordpress.org/plugins/enlarge-textGive your users a widget to enlarge the text on your site.
Is Enlarge Text Safe to Use in 2026?
Generally Safe
Score 85/100Enlarge Text has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "enlarge-text" plugin v2.0 demonstrates a generally good security posture, with no known vulnerabilities or critical code signals indicating immediate threats. The absence of dangerous functions, file operations, external HTTP requests, and the exclusive use of prepared statements for SQL queries are strong indicators of secure coding practices. The plugin also boasts a small attack surface with only one entry point (a shortcode), and importantly, this entry point is not explicitly flagged as unprotected. Taint analysis further reinforces this positive outlook, revealing no critical or high severity flows with unsanitized paths.
However, there are areas that warrant attention. The static analysis reports zero capability checks and zero nonce checks. While the entry point isn't flagged as unprotected, the complete lack of capability checks on any potential interaction points means that the plugin isn't leveraging WordPress's built-in access control mechanisms. This could become a concern if the plugin's functionality were to be expanded in the future or if a more complex attack vector were discovered. The fact that 27% of output is not properly escaped also presents a minor risk of cross-site scripting (XSS) vulnerabilities, although the absence of known CVEs and critical taint flows suggests this might be a low-impact risk in the current implementation.
Overall, "enlarge-text" v2.0 appears to be a secure plugin for its current functionality, especially given its clean vulnerability history. The development team seems to adhere to good practices for common web vulnerabilities like SQL injection. The primary weaknesses lie in the missed opportunities to implement robust WordPress security features like capability checks and the minor concern regarding unescaped output. These are not critical flaws in the current version, but they represent potential areas for improvement to further harden the plugin's security.
Key Concerns
- No capability checks implemented
- No nonce checks implemented
- Unescaped output present (27%)
Enlarge Text Security Vulnerabilities
Enlarge Text Code Analysis
Output Escaping
Enlarge Text Attack Surface
Shortcodes 1
WordPress Hooks 7
Maintenance & Trust
Enlarge Text Maintenance & Trust
Maintenance Signals
Community Trust
Enlarge Text Alternatives
Zeno Font Resizer
zeno-font-resizer
Zeno Font Resizer allows the visitors of your website to change the font size of your text.
Accessibility Font Resizer
accessibility-font-resizer
Make accessibility better for your visitors by enabling them to resize the text on your website and make it bigger.
WP Responsive Auto Fit Text
wp-responsive-slab-text
WP Responsive Auto Fit Text allows you to create great, big, bold headlines that resize to the viewport width, with a WordPress shortcode.
Font Resize With Post Reading Time [GWE]
font-resizer-with-post-reading-time
With this plugin, you can easily display post reading time and a font resizing option on every single blog page.
Enlarge Text Developer Profile
4 plugins · 120 total installs
How We Detect Enlarge Text
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/enlarge-text/inc/class.enqueue.php/wp-content/plugins/enlarge-text/inc/class.js.php/wp-content/plugins/enlarge-text/inc/class.shortcode.php/wp-content/plugins/enlarge-text/inc/class.sizes.php/wp-content/plugins/enlarge-text/inc/class.widget.phpHTML / DOM Fingerprints
sjf-enlarge_text-changersjf_et_activeactiveAdded by Enlarge Textdata-sjf-enlarge_text-is_defaultdata-sjf-enlarge_text-size_multiplierjQuerywindowgetCookiesetCookiesetSizegetSize+7 more