Stick With Me Menu Security & Risk Analysis

wordpress.org/plugins/stick-with-me-menu

This plugin makes the add pages section of the wordpress menu editor stay on screeen no matter how long your menu is.

10 active installs v1.0 PHP + WP 4.0+ Updated Mar 3, 2016
jason-ovallejayden-majormenumenu-editorstick-with-me-menu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Stick With Me Menu Safe to Use in 2026?

Generally Safe

Score 85/100

Stick With Me Menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The static analysis of the "stick-with-me-menu" v1.0 plugin indicates a strong adherence to secure coding practices. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and the exclusive use of prepared statements for SQL are all positive indicators. Furthermore, the plugin has no recorded vulnerability history, with zero known CVEs, and no past security incidents reported.

However, the analysis also highlights a significant concern: the complete lack of any identified entry points, including AJAX handlers, REST API routes, shortcodes, or cron events. While this might imply a very simple or non-interactive plugin, it also means that the plugin's functionality, if any, is not exposed through common WordPress interaction mechanisms. This absence of entry points also correlates with a complete lack of security checks such as nonce and capability checks. This could be a strength if the plugin truly has no user-facing or background operations that require protection, but it's a weakness if there are hidden functionalities that were not detected or if the plugin relies on other means for interaction that are not being secured.

In conclusion, the plugin demonstrates excellent internal code security. The primary area of caution stems from the complete absence of identified entry points and associated security checks. This could be a sign of robust design for a simple plugin or a potential oversight if the plugin has functionalities that are not being secured through standard WordPress mechanisms. Given the current data, the plugin appears low-risk from an internal code perspective, but its overall security posture is difficult to definitively assess without understanding its actual use cases and potential, albeit undetected, interaction points.

Key Concerns

  • No Nonce Checks Detected
  • No Capability Checks Detected
  • No AJAX Handlers
  • No REST API Routes
  • No Shortcodes
  • No Cron Events
Vulnerabilities
None known

Stick With Me Menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Stick With Me Menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Stick With Me Menu Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_enqueue_scriptsstick-with-me-menu.php:20
Maintenance & Trust

Stick With Me Menu Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedMar 3, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Stick With Me Menu Developer Profile

Jayden Major

2 plugins · 4K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Stick With Me Menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/stick-with-me-menu/assets/stick-with-me-menu.css
Version Parameters
stick-with-me-menu/assets/stick-with-me-menu.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Stick With Me Menu