CTCL Floating Cart Security & Risk Analysis

wordpress.org/plugins/ctcl-floating-cart

🚀 Floating Cart for CT Commerce Lite 🛒

70 active installs v0.1.0 PHP 7.0+ WP 6.3.1+ Updated Mar 24, 2026
blockcartctc-liteecommercefloating-cart
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is CTCL Floating Cart Safe to Use in 2026?

Generally Safe

Score 100/100

CTCL Floating Cart has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "ctcl-floating-cart" v0.1.0 plugin exhibits a very strong security posture based on the provided static analysis. The complete absence of any identified dangerous functions, SQL queries without prepared statements, unescaped output, file operations, external HTTP requests, or taint flows is highly commendable. Furthermore, the lack of any known CVEs in its vulnerability history suggests a mature and well-maintained codebase.

However, the analysis also highlights a significant concern: the complete absence of any entry points (AJAX handlers, REST API routes, shortcodes, cron events) and, consequently, any security checks like nonce or capability checks. While this means there are no *currently exploitable* entry points, it also implies that the plugin offers no functionality that requires user interaction or can be triggered externally. This could be intentional, but it also means that if future versions introduce functionality, the security checks will need to be meticulously implemented from scratch.

In conclusion, the current version of "ctcl-floating-cart" appears exceptionally secure due to a lack of exploitable features and adherence to secure coding practices. The main weakness lies in the implicit lack of robust security controls because there are no apparent user-facing features to protect. This suggests that the plugin, in its current state, might be more of a dormant component rather than an actively contributing one, and any expansion of its features would require careful security implementation.

Key Concerns

  • No capability checks detected
  • No nonce checks detected
  • Zero identified entry points
Vulnerabilities
None known

CTCL Floating Cart Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

CTCL Floating Cart Release Timeline

v0.1.0Current
Code Analysis
Analyzed Mar 16, 2026

CTCL Floating Cart Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Attack Surface

CTCL Floating Cart Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitctcl-floating-cart.php:28
actionadmin_noticesctcl-floating-cart.php:36
Maintenance & Trust

CTCL Floating Cart Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 24, 2026
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

CTCL Floating Cart Developer Profile

UjW0L

20 plugins · 2K total installs

93
trust score
Avg Security Score
98/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CTCL Floating Cart

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ctcl-floating-cart/build/index.css/wp-content/plugins/ctcl-floating-cart/build/index.js
Script Paths
/wp-content/plugins/ctcl-floating-cart/build/index.js
Version Parameters
ctcl-floating-cart/build/index.css?ver=ctcl-floating-cart/build/index.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about CTCL Floating Cart