Scheduled Unsticky Security & Risk Analysis

wordpress.org/plugins/scheduled-unsticky

Removes sticky flag after a adjustable period from posts

10 active installs v0.4 PHP + WP 3.0+ Updated Sep 13, 2014
postsremove-stickyscheduledunsticky
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Scheduled Unsticky Safe to Use in 2026?

Generally Safe

Score 85/100

Scheduled Unsticky has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "scheduled-unsticky" v0.4 plugin exhibits a generally good security posture in terms of its attack surface and vulnerability history. Static analysis reveals no apparent entry points like AJAX handlers, REST API routes, or shortcodes that are exposed without authentication checks. Furthermore, the plugin has no recorded vulnerabilities or CVEs, suggesting a history of secure development and maintenance.

However, the code analysis does highlight significant concerns, particularly with its handling of SQL queries and output escaping. The single SQL query is not using prepared statements, which is a common vector for SQL injection vulnerabilities. Additionally, none of the four identified output operations are properly escaped, increasing the risk of cross-site scripting (XSS) attacks. The complete absence of nonce and capability checks on the identified cron event and other potential entry points is also a notable weakness, leaving it susceptible to various attacks if any entry points were to become exposed.

While the lack of known vulnerabilities is a positive sign, the identified code-level weaknesses present a tangible risk. The plugin's strengths lie in its limited attack surface and clean vulnerability history, but the unaddressed risks of SQL injection and XSS due to improper handling of data are serious concerns that should be prioritized for remediation.

Key Concerns

  • SQL query without prepared statements
  • No output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Scheduled Unsticky Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Scheduled Unsticky Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped4 total outputs
Attack Surface

Scheduled Unsticky Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initclass-scheduled-unsticky.php:28
actionplugins_loadedclass-scheduled-unsticky.php:29
actionscheduled_unsticky_postsclass-scheduled-unsticky.php:30

Scheduled Events 1

scheduled_unsticky_posts
Maintenance & Trust

Scheduled Unsticky Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 13, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Scheduled Unsticky Developer Profile

Frank Neumann-Staude

11 plugins · 8K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Scheduled Unsticky

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Scheduled Unsticky