WP-Text-Sizer Security & Risk Analysis

wordpress.org/plugins/wp-text-sizer

Provide visitors to your site the the option of increasing or decreasing the size of text onclick of image or text links using JavaScript.

40 active installs v1.1 PHP + WP 2.7+ Updated Sep 14, 2010
resizeresizertext
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Text-Sizer Safe to Use in 2026?

Generally Safe

Score 85/100

WP-Text-Sizer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The plugin "wp-text-sizer" v1.1 exhibits a seemingly strong security posture based on the provided static analysis. It has a remarkably small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests is positive. The use of prepared statements for all SQL queries is a significant strength. However, a critical concern arises from the output escaping. With 3 total outputs and 0% properly escaped, this indicates a high likelihood of cross-site scripting (XSS) vulnerabilities. The lack of nonce checks and capability checks also means that even if these outputs were rendered through an entry point, they would likely be vulnerable to exploitation.

The plugin's vulnerability history is clean, with no recorded CVEs. This is a positive indicator, suggesting that the developers have either been diligent in avoiding security flaws or that the plugin's limited functionality has not attracted significant attention from attackers. However, the significant finding of unescaped output, coupled with the lack of protective measures like nonce and capability checks, suggests that this clean history might be more a matter of luck or limited exposure than robust security practices. The overall conclusion is that while the plugin's architecture is lean and avoids many common attack vectors, the critical failure in output escaping presents a significant and immediate risk.

Key Concerns

  • Output escaping is not properly implemented
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP-Text-Sizer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP-Text-Sizer Release Timeline

v1.1Current
v1.0
Code Analysis
Analyzed Mar 16, 2026

WP-Text-Sizer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

WP-Text-Sizer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_headwp-text-sizer.php:38
Maintenance & Trust

WP-Text-Sizer Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedSep 14, 2010
PHP min version
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

WP-Text-Sizer Developer Profile

Anthony

2 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-Text-Sizer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-text-sizer/img/large.jpg/wp-content/plugins/wp-text-sizer/img/small.jpg
Script Paths
/wp-content/plugins/wp-text-sizer/textsizer.js
Version Parameters
wp-text-sizer/textsizer.js?ver=

HTML / DOM Fingerprints

HTML Comments
WP Text Sizer HTML BeginsWP Text Sizer HTML Ends
JS Globals
ts
Shortcode Output
javascript:ts('content', -1)javascript:ts('content', 1)
FAQ

Frequently Asked Questions about WP-Text-Sizer