Supreme Google Webfonts Security & Risk Analysis

wordpress.org/plugins/supreme-google-webfonts

Description: Adds all Google Webfonts into your visual editor panel when creating posts or pages. Now you have access to almost 700 universal, cross- …

1K active installs v2.0.1 PHP + WP 3.2.1+ Updated Nov 28, 2017
fontsgoogle-web-fontsgoogle-webfontsvisual-editorwebfonts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Supreme Google Webfonts Safe to Use in 2026?

Generally Safe

Score 85/100

Supreme Google Webfonts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The static analysis of the "supreme-google-webfonts" plugin version 2.0.1 reveals a generally strong security posture with no identified vulnerabilities in its attack surface, code signals, or taint analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly reduces the potential for external exploitation. Furthermore, the plugin demonstrates good coding practices by exclusively using prepared statements for SQL queries and conducting at least one capability check, suggesting that privileged operations are likely protected. The lack of dangerous functions, file operations, and external HTTP requests further strengthens its security profile. The vulnerability history is also clean, with no recorded CVEs, which is a positive indicator of the plugin's past security performance. However, the analysis does highlight a weakness in output escaping, with 27% of outputs not being properly escaped. While the taint analysis did not identify any issues, this could still represent a potential XSS vector if user-supplied data is ever directly reflected without proper sanitization, particularly in the unescaped outputs. Overall, this plugin appears to be well-secured, with the primary area of concern being the unescaped output, which warrants careful review.

Key Concerns

  • Output escaping issues
Vulnerabilities
None known

Supreme Google Webfonts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Supreme Google Webfonts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
8 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

73% escaped11 total outputs
Attack Surface

Supreme Google Webfonts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_footermain.php:18
actionwp_footermain.php:19
filtermce_buttons_3main.php:21
filtertiny_mce_before_initmain.php:22
actionadmin_initmain.php:24
actionplugins_loadedmain.php:28
Maintenance & Trust

Supreme Google Webfonts Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedNov 28, 2017
PHP min version
Downloads46K

Community Trust

Rating82/100
Number of ratings15
Active installs1K
Developer Profile

Supreme Google Webfonts Developer Profile

Josh

5 plugins · 41K total installs

81
trust score
Avg Security Score
81/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Supreme Google Webfonts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/supreme-google-webfonts/sgf-admin.css/wp-content/plugins/supreme-google-webfonts/sgf-frontend.css
Script Paths
/wp-content/plugins/supreme-google-webfonts/sgf-admin.js/wp-content/plugins/supreme-google-webfonts/sgf-frontend.js
Version Parameters
supreme-google-webfonts/sgf-admin.css?ver=supreme-google-webfonts/sgf-frontend.css?ver=supreme-google-webfonts/sgf-admin.js?ver=supreme-google-webfonts/sgf-frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
sgf-fonts
Data Attributes
class="sgf-checkbox"
JS Globals
sgf_toggle_fonts_checkboxes
FAQ

Frequently Asked Questions about Supreme Google Webfonts