R Scroll Up Security & Risk Analysis

wordpress.org/plugins/r-scroll-up

R-Scroll-Up plugin is Simple wordpress plugin for scroll to top one click.

30 active installs v1.0 PHP + WP 3.0.1+ Updated Sep 14, 2014
jquery-scroll-upscroll-to-topscroll-upwordpress-scroll-up
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is R Scroll Up Safe to Use in 2026?

Generally Safe

Score 85/100

R Scroll Up has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'r-scroll-up' v1.0 plugin exhibits a strong overall security posture, with no apparent attack surface exposed through common WordPress entry points like AJAX handlers, REST API routes, shortcodes, or cron events. The code also demonstrates good practices by exclusively using prepared statements for its SQL queries and performing no file operations or external HTTP requests. Furthermore, there are no known vulnerabilities or CVEs associated with this plugin, suggesting a history of responsible development and maintenance.

However, a significant concern arises from the complete lack of output escaping. With 22 outputs identified and none properly escaped, this plugin presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic content rendered by the plugin could be manipulated by an attacker to inject malicious scripts, which would then be executed in the user's browser. Additionally, the absence of nonce and capability checks, even though the attack surface is currently zero, means that if new entry points were introduced without proper security measures, they would be immediately unprotected. This lack of foundational security checks is a critical weakness.

In conclusion, while the plugin's current attack surface is minimal and its SQL practices are commendable, the pervasive lack of output escaping creates a high-risk environment for XSS attacks. The absence of nonce and capability checks, though not exploitable currently, points to a potential oversight in fundamental security principles. A balanced assessment is that the plugin is well-structured in some areas but has a critical flaw in output handling that must be addressed.

Key Concerns

  • No output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

R Scroll Up Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

R Scroll Up Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
22
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped22 total outputs
Attack Surface

R Scroll Up Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menuinc\settings.php:8
actionadmin_initinc\settings.php:60
actionwp_enqueue_scriptsr-scroll-up.php:18
actionwp_headr-scroll-up.php:43
actionwp_enqueue_scriptsr-scroll-up.php:55
actionwp_footerr-scroll-up.php:88
actionwp_footerr-scroll-up.php:103
Maintenance & Trust

R Scroll Up Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 14, 2014
PHP min version
Downloads2K

Community Trust

Rating80/100
Number of ratings1
Active installs30
Developer Profile

R Scroll Up Developer Profile

rasel2339

2 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect R Scroll Up

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about R Scroll Up