Font Resizer with A+, A, A- Security & Risk Analysis

wordpress.org/plugins/font-resizer-matching-theme-style

Increase or Decrease the font size in WordPress website with "A+", "A", "A-" button. Check the Live Preview first, then Install.

30 active installs v4.0 PHP 7.4+ WP 5.5+ Updated Dec 6, 2025
decrease-textfontfont-resizerfont-sizeincrease-text
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Font Resizer with A+, A, A- Safe to Use in 2026?

Generally Safe

Score 100/100

Font Resizer with A+, A, A- has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "font-resizer-matching-theme-style" v4.0 plugin exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests is commendable. The plugin also has a clean vulnerability history with no recorded CVEs, suggesting it has historically been maintained with security in mind. However, there are a few areas that raise concern. The lack of nonce checks and capability checks across all entry points is a significant weakness, particularly as the plugin has a shortcode, which is a common vector for cross-site scripting (XSS) or unauthorized action execution. Furthermore, the fact that only 50% of output is properly escaped leaves room for potential XSS vulnerabilities if the remaining outputs are user-controlled. While the taint analysis shows no unsanitized flows, this may be due to a limited analysis scope or lack of user-supplied data being processed in a sensitive manner within the analyzed code. The plugin's strengths lie in its minimal attack surface and lack of common risky code patterns, but the identified lack of authentication and sanitization for outputs presents a notable risk that warrants attention.

Key Concerns

  • Missing nonce checks on entry points
  • Missing capability checks on entry points
  • Half of output is unescaped
Vulnerabilities
None known

Font Resizer with A+, A, A- Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Font Resizer with A+, A, A- Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped2 total outputs
Attack Surface

Font Resizer with A+, A, A- Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[fontresizer_tawhidurrahmandear_widget] font-resizer-matching-theme-style.php:131
WordPress Hooks 2
filterplugin_row_metafont-resizer-matching-theme-style.php:34
actionwidgets_initfont-resizer-matching-theme-style.php:121
Maintenance & Trust

Font Resizer with A+, A, A- Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 6, 2025
PHP min version7.4
Downloads7K

Community Trust

Rating20/100
Number of ratings1
Active installs30
Developer Profile

Font Resizer with A+, A, A- Developer Profile

Dear

17 plugins · 1K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Font Resizer with A+, A, A-

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
fontresizertawhidurrahmandear
HTML Comments
Widget Code BeginsWidget Code Ends
Shortcode Output
[fontresizer_tawhidurrahmandear_widget]
FAQ

Frequently Asked Questions about Font Resizer with A+, A, A-