Fontify Security & Risk Analysis

wordpress.org/plugins/fontify

Upload and apply custom fonts (WOFF or WOFF2) to your entire WordPress site, including admin panel — without writing code.

20 active installs v1.0.0 PHP 7.2+ WP 5.0+ Updated May 4, 2025
custom-fontsfont-uploadertypographywoffwoff2
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Fontify Safe to Use in 2026?

Generally Safe

Score 100/100

Fontify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11mo ago
Risk Assessment

The Fontify plugin version 1.0.0 exhibits a generally strong security posture based on the provided static analysis results. The absence of any detected CVEs and a clean vulnerability history suggest a well-maintained and secure codebase over time. The code analysis indicates no dangerous functions, SQL injection vulnerabilities, file operations, or external HTTP requests. Importantly, the plugin utilizes prepared statements for all SQL queries and includes a nonce check, which are crucial security practices. The limited attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events further contributes to its security.

However, a notable concern arises from the output escaping. With 15 total outputs and only 73% properly escaped, there's a potential for cross-site scripting (XSS) vulnerabilities. While the taint analysis didn't reveal unsanitized paths or critical/high severity flows, the insufficient output escaping could still allow for reflected or stored XSS if user-supplied data is directly outputted without proper sanitization in the remaining 27% of cases. The lack of capability checks on entry points, although currently not an issue due to the zero attack surface, could become a risk if new entry points are added in the future without appropriate permission checks.

In conclusion, Fontify v1.0.0 is fundamentally secure due to its minimal attack surface, secure database interactions, and the presence of nonce checks. Its vulnerability history is a significant strength. The primary weakness lies in the incomplete output escaping, which warrants attention to prevent potential XSS vulnerabilities. The absence of capability checks on entry points is a minor concern given the current attack surface, but it's a good practice to consider for future development.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

Fontify Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Fontify Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
11 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

73% escaped15 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
wpfm_settings_page (fontify.php:28)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Fontify Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menufontify.php:17
actionadmin_enqueue_scriptsfontify.php:123
actionwp_enqueue_scriptsfontify.php:124
Maintenance & Trust

Fontify Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedMay 4, 2025
PHP min version7.2
Downloads435

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Fontify Developer Profile

Pouria Zahedi

1 plugin · 20 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Fontify

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Fontify