Real Sticky Security & Risk Analysis

wordpress.org/plugins/real-sticky

Import a Sticky page to top of site.

10 active installs v1.3.1 PHP + WP 4.9.4+ Updated Mar 24, 2018
easyfreequickrealsimple
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Real Sticky Safe to Use in 2026?

Generally Safe

Score 85/100

Real Sticky has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "real-sticky" plugin version 1.3.1 presents a mixed security picture. On one hand, the static analysis reveals no identifiable attack surface through common WordPress entry points like AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the absence of dangerous functions, SQL queries (all prepared), file operations, and external HTTP requests is a positive indicator. However, a significant concern arises from the output escaping. With 6 total outputs and 0% properly escaped, this indicates a high likelihood of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into user-facing content. The lack of nonce and capability checks further exacerbates this risk, as there are no built-in mechanisms to verify user intent or permissions on potential data handling points, although the static analysis shows no such points were identified. The plugin's vulnerability history is clean, with zero recorded CVEs, which is encouraging but does not negate the risks identified in the static code analysis. Overall, while the plugin appears to have a small attack surface and avoids common pitfalls like raw SQL, the complete lack of output escaping is a critical security flaw that exposes users to XSS attacks. The absence of any identified vulnerabilities in its history may be due to its limited functionality or a lack of in-depth security auditing.

Key Concerns

  • 0% output escaping
  • 0 nonce checks
  • 0 capability checks
Vulnerabilities
None known

Real Sticky Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Real Sticky Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

Real Sticky Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitreal-sticky.php:37
actionwp_headreal-sticky.php:38
actionadmin_menureal-sticky.php:39
actionloop_startreal-sticky.php:68
Maintenance & Trust

Real Sticky Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMar 24, 2018
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Real Sticky Developer Profile

GraphicEdit

7 plugins · 610 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Real Sticky

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/real-sticky/js/real-sticky.js
Script Paths
/wp-content/plugins/real-sticky/js/real-sticky.js
Version Parameters
real-sticky/js/real-sticky.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!--real-sticky-->
FAQ

Frequently Asked Questions about Real Sticky