SticklyUI Security & Risk Analysis

wordpress.org/plugins/sticklyui

Create customizable floating service buttons, a sticky header, and a dedicated contact button with a popup form for your WordPress site.

0 active installs v1.0.0 PHP 7.0+ WP 5.0+ Updated Jan 14, 2026
contact-buttonfloating-buttonssocial-mediasticky-headersticky-menu
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is SticklyUI Safe to Use in 2026?

Generally Safe

Score 100/100

SticklyUI has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "sticklyui" v1.0.0 plugin presents a mixed security posture. On the positive side, the plugin demonstrates strong adherence to secure coding practices by extensively using prepared statements for SQL queries and properly escaping nearly all output. It also correctly implements nonce checks on a significant portion of its AJAX handlers and has a clean vulnerability history with no recorded CVEs. The absence of dangerous functions, file operations, and external HTTP requests further strengthens its security profile.

However, a significant concern arises from the plugin's attack surface. All 9 identified AJAX handlers lack proper authentication checks, creating a substantial risk for unauthorized actions. While taint analysis shows no critical or high severity flows, the unprotected AJAX endpoints mean that any attacker could potentially trigger these handlers without prior verification of user privileges or intent. This lack of authorization on entry points is the most critical weakness identified.

Given the lack of known vulnerabilities and good coding practices in other areas, the plugin's overall security is decent but hampered by the critical oversight in its AJAX handler authorization. Addressing the unprotected AJAX handlers should be the immediate priority to mitigate the most significant risk.

Key Concerns

  • AJAX handlers without auth checks
  • Large attack surface without authentication
Vulnerabilities
None known

SticklyUI Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SticklyUI Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
4 prepared
Unescaped Output
1
67 escaped
Nonce Checks
8
Capability Checks
5
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

67% prepared6 total queries

Output Escaping

99% escaped68 total outputs
Attack Surface
9 unprotected

SticklyUI Attack Surface

Entry Points9
Unprotected9

AJAX Handlers 9

authwp_ajax_sticklyui_get_buttonsincludes\class-sticklyui.php:76
authwp_ajax_sticklyui_save_buttonincludes\class-sticklyui.php:77
authwp_ajax_sticklyui_delete_buttonincludes\class-sticklyui.php:78
authwp_ajax_sticklyui_toggle_statusincludes\class-sticklyui.php:79
authwp_ajax_sticklyui_update_orderincludes\class-sticklyui.php:80
authwp_ajax_sticklyui_save_header_settingsincludes\class-sticklyui.php:81
authwp_ajax_sticklyui_get_header_settingsincludes\class-sticklyui.php:82
authwp_ajax_sticklyui_save_contact_settingsincludes\class-sticklyui.php:83
authwp_ajax_sticklyui_get_contact_settingsincludes\class-sticklyui.php:84
WordPress Hooks 7
actionplugins_loadedincludes\class-sticklyui.php:62
actionadmin_enqueue_scriptsincludes\class-sticklyui.php:71
actionadmin_enqueue_scriptsincludes\class-sticklyui.php:72
actionadmin_menuincludes\class-sticklyui.php:73
actionwp_enqueue_scriptsincludes\class-sticklyui.php:93
actionwp_enqueue_scriptsincludes\class-sticklyui.php:94
actionwp_footerincludes\class-sticklyui.php:95
Maintenance & Trust

SticklyUI Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 14, 2026
PHP min version7.0
Downloads102

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

SticklyUI Developer Profile

arunkunwar

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SticklyUI

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sticklyui/admin/css/sticklyui-admin.css/wp-content/plugins/sticklyui/public/css/sticklyui-public.css/wp-content/plugins/sticklyui/public/js/sticklyui-public.js
Script Paths
/wp-content/plugins/sticklyui/admin/js/sticklyui-admin.js
Version Parameters
sticklyui-admin?ver=sticklyui-public?ver=sticklyui-public?ver=

HTML / DOM Fingerprints

CSS Classes
sticklyui-buttonsticklyui-button-wrapper
HTML Comments
<!-- SticklyUI -->
Data Attributes
data-sticklyui-tooltipdata-sticklyui-position
JS Globals
sticklyuiAdmin
FAQ

Frequently Asked Questions about SticklyUI