
Scroll To Security & Risk Analysis
wordpress.org/plugins/scroll-toBlock element of scroll to top or a specific HTML element.
Is Scroll To Safe to Use in 2026?
Generally Safe
Score 85/100Scroll To has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'scroll-to' plugin v1.0.2 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, or critical taint flows is highly positive. Furthermore, the plugin has no recorded CVEs, indicating a history of secure development or effective patching. The attack surface is effectively zero, with no AJAX handlers, REST API routes, shortcodes, or cron events, meaning there are no direct entry points for attackers to exploit.
However, the analysis also reveals a complete lack of any security checks, including nonce checks and capability checks. While the current implementation has no exploitable entry points and no known vulnerabilities, this lack of authorization and input validation mechanisms represents a significant concern. If the plugin were to be updated in the future to include any of these entry points without proper security controls, it would be highly susceptible to attacks. The plugin's current security relies entirely on its lack of functionality rather than robust security implementations.
In conclusion, while 'scroll-to' v1.0.2 is currently secure due to its minimal attack surface and clean code, its security is fragile. The complete absence of any security checks is a substantial weakness. The plugin demonstrates good practices in avoiding common pitfalls like raw SQL and unescaped output, but the lack of any authorization or input validation mechanisms means it is not inherently secure if its functionality were to expand. This plugin is safe for now, but future development needs to incorporate robust security controls.
Key Concerns
- No nonce checks implemented
- No capability checks implemented
Scroll To Security Vulnerabilities
Scroll To Release Timeline
Scroll To Code Analysis
Scroll To Attack Surface
WordPress Hooks 1
Maintenance & Trust
Scroll To Maintenance & Trust
Maintenance Signals
Community Trust
Scroll To Alternatives
Classic Editor
classic-editor
Enables the previous "classic" editor and the old-style Edit Post screen with TinyMCE, Meta Boxes, etc. Supports all plugins that extend this screen.
Starter Templates – AI-Powered Templates for Elementor & Gutenberg
astra-sites
The growing library of 300+ ready-to-use templates that work with all WordPress themes including Astra, Hello, OceanWP, GeneratePress and more
Advanced Editor Tools
tinymce-advanced
Extends and enhances the block editor (Gutenberg) and the classic editor (TinyMCE).
Disable Gutenberg
disable-gutenberg
Disable Gutenberg Block Editor and restore the Classic Editor and original Edit Post screen (TinyMCE, meta boxes, etc.).
Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns
essential-blocks
Gutenberg block editor with AI. 70+ Gutenberg blocks, patterns, WooCommerce blocks, post grid, gallery, menu with Gutenberg block library.
Scroll To Developer Profile
1 plugin · 0 total installs
How We Detect Scroll To
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/scroll-to/build/index.css/wp-content/plugins/scroll-to/build/index.js/wp-content/plugins/scroll-to/build/index.jsscroll-to/build/index.css?ver=scroll-to/build/index.js?ver=