RH Devnia Webfonts Security & Risk Analysis

wordpress.org/plugins/rh-devnia-webfonts

this plugin is change your body font with devnia web fonts service if yout site was in arabic language.

10 active installs v1.0 PHP + WP 3.9+ Updated Jan 20, 2015
arabicbootstrapfontsweb-fonts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is RH Devnia Webfonts Safe to Use in 2026?

Generally Safe

Score 85/100

RH Devnia Webfonts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The rh-devnia-webfonts v1.0 plugin presents a mixed security picture. On the positive side, the plugin demonstrates good practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and showing no known past vulnerabilities or active CVEs. The attack surface appears to be minimal, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed. However, a significant concern is the complete lack of output escaping, with 100% of detected outputs not being properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if the data being output is user-controlled or originates from an untrusted source. Additionally, the taint analysis revealed one flow with an unsanitized path, which, although not classified as critical or high severity in this specific instance, warrants attention as it indicates potential for path traversal or file inclusion vulnerabilities in the future if not addressed.

While the absence of known vulnerabilities and a seemingly small attack surface are strengths, the identified output escaping and taint flow issues represent clear security weaknesses. The fact that 100% of outputs are unescaped is a critical oversight that could easily be exploited. The single unsanitized path flow, even if currently benign, points to a potential weakness in data handling. Therefore, despite the positive indicators, the plugin is not entirely secure due to these specific coding oversights. Immediate attention should be given to implementing proper output escaping for all dynamic content displayed by the plugin.

Key Concerns

  • 0% of outputs properly escaped
  • 1 flow with unsanitized paths
Vulnerabilities
None known

RH Devnia Webfonts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

RH Devnia Webfonts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped8 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<change_font> (change_font.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

RH Devnia Webfonts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitindex.php:22
actionwp_headindex.php:45
actionadmin_print_stylesindex.php:52
actionadmin_menuindex.php:62
Maintenance & Trust

RH Devnia Webfonts Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedJan 20, 2015
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

RH Devnia Webfonts Developer Profile

waheeds

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RH Devnia Webfonts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rh-devnia-webfonts/bootstrap/css/bootstrap.css/wp-content/plugins/rh-devnia-webfonts/fonts.js
Script Paths
https://ajax.googleapis.com/ajax/libs/jquery/1.11.2/jquery.min.js/wp-content/plugins/rh-devnia-webfonts/fonts.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about RH Devnia Webfonts