Fonts Security & Risk Analysis

wordpress.org/plugins/fonts

Add More Font To Your WordPress Editor

9K active installs v3.0 PHP + WP 4.0+ Updated Oct 1, 2025
custom-fontseditor-fontsfont-pluginfontsgoogle-fonts
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Fonts Safe to Use in 2026?

Generally Safe

Score 100/100

Fonts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6mo ago
Risk Assessment

The "fonts" plugin v3.0 demonstrates a generally strong security posture based on the static analysis results. It has no apparent attack surface exposed through common WordPress entry points like AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code does not utilize dangerous functions, performs no file operations or external HTTP requests, and exclusively uses prepared statements for SQL queries. This indicates a thoughtful approach to preventing many common types of vulnerabilities.

However, a significant concern arises from the complete lack of output escaping. With four identified output points and 0% being properly escaped, any data rendered by this plugin is highly susceptible to cross-site scripting (XSS) attacks. This is a critical oversight that can lead to severe security breaches. Additionally, the absence of nonce and capability checks on any potential (though currently undiscovered) entry points is a weakness. The plugin also has no recorded vulnerability history, which is positive, but this can sometimes be due to a lack of past scrutiny rather than inherent security.

In conclusion, while the "fonts" plugin v3.0 excels in avoiding direct attack vectors and secure data handling for SQL, the pervasive failure in output escaping represents a major and exploitable vulnerability. The lack of authorization checks, while not immediately exploitable due to the limited attack surface, leaves a potential gap. The absence of historical vulnerabilities is encouraging but should not overshadow the critical issue of unescaped output.

Key Concerns

  • Unescaped output on all entry points
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Fonts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Fonts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Fonts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_enqueue_scriptsfonts.php:20
actionadmin_headfonts.php:80
actionadmin_menufonts.php:83
filtermce_buttons_3fonts.php:437
actionadmin_noticesfonts.php:439
actionadmin_initfonts.php:451
Maintenance & Trust

Fonts Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 1, 2025
PHP min version
Downloads310K

Community Trust

Rating88/100
Number of ratings99
Active installs9K
Developer Profile

Fonts Developer Profile

WP SITES

2 plugins · 9K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Fonts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fonts/assets/css/admin.css
Version Parameters
fonts/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
fonts-pro-dashboardfonts-pro-quick-actionsfonts-pro-upgrade-noticegoogle-fonts-header
JS Globals
jQuery
FAQ

Frequently Asked Questions about Fonts