Simple Zoomer Security & Risk Analysis

wordpress.org/plugins/simple-zoomer

This plugin will enable increase the font size of the page for better reading experience.

10 active installs v1.0 PHP + WP 2.7+ Updated Sep 18, 2013
body-zoomerfont-increasefont-sizefont-zoomsimple-zoomer
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Zoomer Safe to Use in 2026?

Generally Safe

Score 85/100

Simple Zoomer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "simple-zoomer" plugin v1.0 exhibits a mixed security posture. On the positive side, the plugin demonstrates excellent practices in handling database interactions, with all SQL queries utilizing prepared statements. Furthermore, there's no recorded vulnerability history, suggesting a stable and potentially well-maintained codebase. The absence of external HTTP requests and file operations also reduces common attack vectors.

However, significant concerns arise from the static analysis. The presence of the `create_function` is a critical red flag, as it is a deprecated and highly insecure PHP function that can lead to arbitrary code execution if misused. The alarmingly low percentage of properly escaped output (14%) indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. The complete lack of nonce checks and capability checks across all entry points, even though the current attack surface is reported as zero, is a serious oversight. If the plugin were to introduce any new entry points in the future, they would be entirely unprotected.

In conclusion, while the plugin benefits from secure database practices and a clean vulnerability history, the use of `create_function` and the widespread lack of output escaping and authorization checks represent substantial security weaknesses. These issues create a high potential for exploitation, particularly for XSS and code execution, should any part of the attack surface become accessible.

Key Concerns

  • Use of create_function()
  • Low percentage of properly escaped output
  • Missing nonce checks on entry points
  • Missing capability checks on entry points
Vulnerabilities
None known

Simple Zoomer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Simple Zoomer Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Simple Zoomer Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
6
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("simple_zoomer");'));simple-zoomer.php:70

Output Escaping

14% escaped7 total outputs
Attack Surface

Simple Zoomer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initsimple-zoomer.php:70
Maintenance & Trust

Simple Zoomer Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedSep 18, 2013
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Simple Zoomer Developer Profile

chandra sekhar Gudavalli

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Zoomer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
var fontSize = 1;function zoomIn()function zoomOut()
FAQ

Frequently Asked Questions about Simple Zoomer