CTCL Floating Cart Security & Risk Analysis

wordpress.org/plugins/ctcl-floating-cart

๐Ÿš€ Floating Cart for CT Commerce Lite ๐Ÿ›’

70 active installs v0.1.0 PHP 7.0+ WP 6.3.1+ Updated Apr 18, 2025
blockcartctc-liteecommercefloating-cart
100
A ยท Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is CTCL Floating Cart Safe to Use in 2026?

Generally Safe

Score 100/100

CTCL Floating Cart has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11mo ago
Risk Assessment

The "ctcl-floating-cart" v0.1.0 plugin exhibits a very strong security posture based on the provided static analysis. The complete absence of any identified dangerous functions, SQL queries without prepared statements, unescaped output, file operations, external HTTP requests, or taint flows is highly commendable. Furthermore, the lack of any known CVEs in its vulnerability history suggests a mature and well-maintained codebase.

However, the analysis also highlights a significant concern: the complete absence of any entry points (AJAX handlers, REST API routes, shortcodes, cron events) and, consequently, any security checks like nonce or capability checks. While this means there are no *currently exploitable* entry points, it also implies that the plugin offers no functionality that requires user interaction or can be triggered externally. This could be intentional, but it also means that if future versions introduce functionality, the security checks will need to be meticulously implemented from scratch.

In conclusion, the current version of "ctcl-floating-cart" appears exceptionally secure due to a lack of exploitable features and adherence to secure coding practices. The main weakness lies in the implicit lack of robust security controls because there are no apparent user-facing features to protect. This suggests that the plugin, in its current state, might be more of a dormant component rather than an actively contributing one, and any expansion of its features would require careful security implementation.

Key Concerns

  • No capability checks detected
  • No nonce checks detected
  • Zero identified entry points
Vulnerabilities
None known

CTCL Floating Cart Security Vulnerabilities

No known vulnerabilities โ€” this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CTCL Floating Cart Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Attack Surface

CTCL Floating Cart Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitctcl-floating-cart.php:28
actionadmin_noticesctcl-floating-cart.php:36
Maintenance & Trust

CTCL Floating Cart Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 18, 2025
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

CTCL Floating Cart Developer Profile

UjW0L

17 plugins ยท 2K total installs

93
trust score
Avg Security Score
99/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CTCL Floating Cart

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ctcl-floating-cart/build/index.css/wp-content/plugins/ctcl-floating-cart/build/index.js
Script Paths
/wp-content/plugins/ctcl-floating-cart/build/index.js
Version Parameters
ctcl-floating-cart/build/index.css?ver=ctcl-floating-cart/build/index.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about CTCL Floating Cart