Simple Sticky Footer Security & Risk Analysis

wordpress.org/plugins/simple-sticky-footer

Simple Sticky Footer is a lightweight plugin, it allows to promote/advertise a WP Page (rich-text document) as a sticky footer (always on top div).

700 active installs v1.3.5 PHP + WP 3.1.0+ Updated Dec 10, 2016
advertisingdiv-always-on-topsticky-divsticky-footer
59
C · Use Caution
CVEs total2
Unpatched1
Last CVEJun 19, 2025
Safety Verdict

Is Simple Sticky Footer Safe to Use in 2026?

Use With Caution

Score 59/100

Simple Sticky Footer has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

2 known CVEs 1 unpatched Last CVE: Jun 19, 2025Updated 9yr ago
Risk Assessment

The 'simple-sticky-footer' plugin, version 1.3.5, exhibits a mixed security posture. On the positive side, it demonstrates good practices by not utilizing dangerous functions, all SQL queries are prepared, and there are no observed file operations or external HTTP requests. The presence of nonce checks and a single shortcode as the sole entry point with no explicit authentication bypasses is also encouraging. However, a significant concern arises from the moderate output escaping, with 61% of outputs not being properly escaped. This leaves the plugin susceptible to Cross-Site Scripting (XSS) vulnerabilities, especially given its history.

The plugin's vulnerability history is a major red flag. With two known CVEs, one of which is still unpatched and classified as high severity, the plugin has a demonstrable track record of security flaws. The common types of past vulnerabilities, XSS and CSRF, align with potential risks stemming from improperly escaped output. The existence of an unpatched high-severity vulnerability indicates a lack of timely security maintenance, posing an immediate risk to users. While the static analysis does not reveal critical taint flows or direct SQL injection vectors, the historical context strongly suggests that potential vulnerabilities are likely related to input handling and output rendering.

In conclusion, 'simple-sticky-footer' v1.3.5 has strengths in its control over dangerous functions and SQL queries. However, the incomplete output escaping and, more critically, the presence of an unpatched high-severity vulnerability and a history of XSS/CSRF issues, present a substantial risk. Users should exercise extreme caution and prioritize updating to a version that addresses the known vulnerability, if available, or consider alternative plugins.

Key Concerns

  • Unpatched high severity CVE
  • Medium severity CVE (unpatched)
  • Insufficient output escaping (39% proper)
  • No capability checks
Vulnerabilities
2

Simple Sticky Footer Security Vulnerabilities

CVEs by Year

1 CVE in 2014
2014
1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

High
1
Medium
1

2 total CVEs

CVE-2025-50019medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Simple Sticky Footer <= 1.3.5 - Authenticated (Contributor+) Stored Cross-Site Scripting

Jun 19, 2025Unpatched
CVE-2014-9454high · 8.8Cross-Site Request Forgery (CSRF)

Simple Sticky Footer <= 1.3.2 - Cross-Site Request Forgery to Cross-Site Scripting

Oct 12, 2014 Patched in 1.3.3 (3390d)
Code Analysis
Analyzed Mar 16, 2026

Simple Sticky Footer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
7 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

39% escaped18 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
simple_sf_ban_callback (simple-sticky-footer.php:52)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Simple Sticky Footer Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[simple_sf] simple-sticky-footer.php:245
WordPress Hooks 4
actionwp_footersimple-sticky-footer.php:12
actionwp_headsimple-sticky-footer.php:14
actionadmin_initsimple-sticky-footer.php:15
actionadmin_menusimple-sticky-footer.php:16
Maintenance & Trust

Simple Sticky Footer Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedDec 10, 2016
PHP min version
Downloads47K

Community Trust

Rating78/100
Number of ratings10
Active installs700
Developer Profile

Simple Sticky Footer Developer Profile

Sandor Kovacs

5 plugins · 3K total installs

62
trust score
Avg Security Score
75/100
Avg Patch Time
3360 days
View full developer profile
Detection Fingerprints

How We Detect Simple Sticky Footer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-sticky-footer/simple-sticky-footer.css/wp-content/plugins/simple-sticky-footer/simple-sticky-footer.js
Script Paths
/wp-content/plugins/simple-sticky-footer/simple-sticky-footer.js
Version Parameters
simple-sticky-footer/simple-sticky-footer.css?ver=simple-sticky-footer/simple-sticky-footer.js?ver=

HTML / DOM Fingerprints

CSS Classes
simple-sf-widthsimple-sf-effectsimple-sf-delaysimple-sf-stylesimple-sf-hidesimple-sf-activate-shortcode
Data Attributes
id='simple-sf'name='simple_sf_width'id='simple-sf-width'name='simple_sf_effect'id='simple-sf-effect'name='simple_sf_delay'+7 more
FAQ

Frequently Asked Questions about Simple Sticky Footer