Click to top Security & Risk Analysis

wordpress.org/plugins/click-to-top

A wordpress plugin to create a customisable Click To Top feature.

2K active installs v1.3.0 PHP + WP 6.0+ Updated Dec 3, 2025
arrow-iconback-to-toppage-scrollingscroll-to-topscroll-up
99
A · Safe
CVEs total2
Unpatched0
Last CVEDec 16, 2022
Safety Verdict

Is Click to top Safe to Use in 2026?

Generally Safe

Score 99/100

Click to top has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Dec 16, 2022Updated 4mo ago
Risk Assessment

The 'click-to-top' plugin v1.3.0 demonstrates a generally good security posture in its static analysis, with no dangerous functions, no unescaped SQL queries, and a high percentage of output escaping. The presence of nonce and capability checks on its AJAX handlers is also a positive sign, indicating an effort to secure these entry points.

However, the plugin's vulnerability history is a significant concern. With two known medium-severity vulnerabilities in the past, specifically related to Missing Authorization and Cross-site Scripting, there's a pattern of past security weaknesses. While there are currently no unpatched vulnerabilities, the historical prevalence of these common and impactful vulnerability types suggests potential underlying issues in how user input is handled or how authorization is managed.

While the current code analysis doesn't reveal immediate exploitable flaws, the historical context warrants caution. The plugin has a history of exploitable vulnerabilities that were addressed, but the recurring nature of certain vulnerability types suggests a need for ongoing scrutiny and potentially more robust security practices in future development to prevent similar issues from resurfacing.

Key Concerns

  • Two known medium severity vulnerabilities
  • History of XSS and Missing Authorization
  • 84% output escaping (16% not properly escaped)
Vulnerabilities
2

Click to top Security Vulnerabilities

CVEs by Year

1 CVE in 2020
2020
1 CVE in 2022
2022
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

Appsero <= 1.2.1 - Missing Authorization

Dec 16, 2022 Patched in 1.2.20 (699d)
WF-da15614b-6619-4ccb-93eb-12923910fb41-click-to-topmedium · 5.5Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Click to top <= 1.2.7 - Authenticated (Admin+) Stored Cross-Site Scripting

Aug 19, 2020 Patched in 1.2.8 (1252d)
Code Analysis
Analyzed Mar 16, 2026

Click to top Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
81 escaped
Nonce Checks
3
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

84% escaped97 total outputs
Attack Surface

Click to top Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 3

authwp_ajax_ctt_install_pluginadmin\click_top_options.php:24
authwp_ajax_ctt_activate_pluginadmin\click_top_options.php:25
authwp_ajax_click_to_top_dismiss_noticeclick-to-top.php:183
WordPress Hooks 13
actionadmin_initadmin\click_top_options.php:20
actionadmin_menuadmin\click_top_options.php:21
actionadmin_noticesadmin\click_top_options.php:1264
actioninitadmin\click_top_options.php:1273
actionadmin_noticesadmin\nt-class.php:150
actionadmin_enqueue_scriptsadmin\src\class.settings-api.php:32
actionwp_enqueue_scriptsclick-to-top.php:55
actionplugins_loadedclick-to-top.php:73
actionadmin_enqueue_scriptsclick-to-top.php:80
actionadmin_noticesclick-to-top.php:164
actionadmin_initclick-to-top.php:204
actionwp_enqueue_scriptsincludes\click_top_options_set.php:495
actionwp_enqueue_scriptsincludes\click_top_options_set.php:506
Maintenance & Trust

Click to top Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 3, 2025
PHP min version
Downloads97K

Community Trust

Rating40/100
Number of ratings2
Active installs2K
Developer Profile

Click to top Developer Profile

Noor Alam

102 plugins · 29K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
233 days
View full developer profile
Detection Fingerprints

How We Detect Click to top

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/click-to-top/assets/css/click-top-icons.css/wp-content/plugins/click-to-top/assets/css/hover.css/wp-content/plugins/click-to-top/assets/css/click-top-style.css/wp-content/plugins/click-to-top/assets/js/jquery.easing.js/wp-content/plugins/click-to-top/assets/js/jquery.scrollUp.js
Script Paths
/wp-content/plugins/click-to-top/assets/js/admin.js
Version Parameters
click-to-top/assets/css/click-top-icons.css?ver=click-to-top/assets/css/click-top-style.css?ver=

HTML / DOM Fingerprints

CSS Classes
click-to-top-update-noticeclick-to-top-dismiss-notice
Data Attributes
data-notice-dismiss
JS Globals
click_to_top_dismiss_nonce
FAQ

Frequently Asked Questions about Click to top