Simple Goto Top Button Security & Risk Analysis

wordpress.org/plugins/simple-goto-top-button

Add scroll to top button with simple way by using this plugin, very simply to use without having technical knowledge, just install & activate plug …

90 active installs v1.0 PHP + WP 4.6+ Updated Feb 4, 2026
goto-top-buttonpage-scroll-to-toppage-top-buttonscroll-to-top-buttontop-button
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Goto Top Button Safe to Use in 2026?

Generally Safe

Score 100/100

Simple Goto Top Button has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The plugin "simple-goto-top-button" v1.0 exhibits a generally positive security posture based on the provided static analysis. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the analysis indicates no dangerous functions, file operations, or external HTTP requests, which are common vectors for exploitation. All identified SQL queries utilize prepared statements, a crucial security best practice. The plugin's vulnerability history is also clean, with no recorded CVEs, suggesting a history of secure development or effective patching by maintainers.

However, a significant concern arises from the complete lack of output escaping. With 12 total outputs and 0% properly escaped, this presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is displayed to users without proper sanitization or escaping can be manipulated to inject malicious scripts. While the attack surface is minimal and there are no critical taint flows or unpatched vulnerabilities, the unescaped output is a glaring weakness that could be exploited to compromise user sessions or deface websites.

In conclusion, while the plugin avoids many common pitfalls and has a clean vulnerability history, the critical flaw in output escaping negates much of its strength. The developers need to immediately address the lack of output sanitization to mitigate the high risk of XSS attacks. Until this is fixed, the plugin should be considered potentially dangerous.

Key Concerns

  • Output escaping is not properly implemented
Vulnerabilities
None known

Simple Goto Top Button Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Simple Goto Top Button Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped12 total outputs
Attack Surface

Simple Goto Top Button Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_enqueue_scriptssimple-goto-top-button.php:19
actionadmin_enqueue_scriptssimple-goto-top-button.php:34
actionadmin_menusimple-goto-top-button.php:39
actionadmin_initsimple-goto-top-button.php:40
actionwp_footersimple-goto-top-button.php:196
Maintenance & Trust

Simple Goto Top Button Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 4, 2026
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs90
Developer Profile

Simple Goto Top Button Developer Profile

Come2theweb

5 plugins · 420 total installs

97
trust score
Avg Security Score
95/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect Simple Goto Top Button

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Simple Goto Top Button