I would ask you consider stop using allow_url_fopen and use a safer alternative.
None of our templates require allow_url_fopen to be Enabled. We rely on cURL and Ajax to accomplish our tasks.The new Joomla! updater does not solely rely on URL fopen() wrappers anymore. It will prefer using cURL if it's enabled on your system (virtually all live hosts have it enabled). Only if cURL is not available will it try using URL fopen() wrappers, if they are enabled. However, that is true only for the Joomla! updater. The extensions updater (Extensions, Manage Extensions, Update) still exclusively relies on URL fopen() wrappers, hence the warning.
Regarding the security of URL fopen() wrappers, it depends on your PHP version. In versions prior to PHP 5.2.0, enabling the allow_url_fopen would also allow PPH to include remotely stored files as if they were stored locally. This was being exploited by hackers, hosting malicious code on their server as .txt files and including them on victim sites by taking advantage of remote file inclusion vulnerabilities. Since PHP 5.2.0 a new directive, allow_url_include, is made available. When it's set to 0, you can have fully functional URL fopen() wrappers but disallow inclusion of remotely hosted code. Ref:
www.php.net/manual/en/filesystem.configu...ni.allow-url-include
As a result, all security warnings regarding allow_url_fopen are outdated by at least five years - PHP 5.2.0 was released in November 2nd, 2006. Unfortunately, I've only seen people discussing allow_url_include the last year or so. The instructions in the security checklist have been first written several years ago, are still relevant, but that part is not entirely accurate. It's good as a rule of thumb, but not accurate

If you still don't believe us then on the Joomla forums it has been noted that the info about allow_url_fopen is OUTDATED ->