Sticky Add to Cart Security & Risk Analysis

wordpress.org/plugins/sticky-add-to-cart

Move old add to cart button for woocommerce plugin to fix at the end of mobile screen

10 active installs v1.0.0 PHP 5.2.4+ WP 4.6+ Updated Sep 8, 2018
add-to-cartsticky-add-to-cartwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Sticky Add to Cart Safe to Use in 2026?

Generally Safe

Score 85/100

Sticky Add to Cart has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'sticky-add-to-cart' plugin v1.0.0 exhibits a strong security posture with no apparent vulnerabilities detected in the code. The analysis indicates an absence of dangerous functions, SQL queries without prepared statements, and unescaped output. Furthermore, there are no file operations or external HTTP requests that could introduce risks. The plugin also adheres to security best practices by implementing nonce and capability checks where appropriate, although the static analysis reports zero instances of these being used, which is a point of concern given the absence of explicit entry points. The lack of any historical vulnerabilities further reinforces its current security standing. However, the complete absence of any identified entry points (AJAX, REST API, shortcodes, cron events) and the corresponding lack of any nonce or capability checks, while seemingly positive in that no *unprotected* entry points exist, also suggests a very limited or possibly non-functional plugin from a security perspective. It is unusual for a plugin to have zero entry points. This could mean the plugin is either extremely basic, or the analysis might be incomplete in identifying all potential interaction points. Therefore, while the code itself appears clean and robust, the lack of discernible functionality that would require security checks warrants caution. It's recommended to verify the plugin's actual functionality and ensure that any interaction points are indeed secured, even if not explicitly flagged by this analysis.

Key Concerns

  • No nonce checks detected
  • No capability checks detected
  • Zero attack surface entry points
Vulnerabilities
None known

Sticky Add to Cart Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Sticky Add to Cart Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Sticky Add to Cart Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitsticky-add-to-cart.php:24
actionwoocommerce_before_single_productsticky-add-to-cart.php:54
Maintenance & Trust

Sticky Add to Cart Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedSep 8, 2018
PHP min version5.2.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Sticky Add to Cart Developer Profile

bankthaworn

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sticky Add to Cart

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sticky-add-to-cart/sticky-add-to-cart.php

HTML / DOM Fingerprints

CSS Classes
sticky_atc_btnsticky_atc_btn-rowwrapper-content
Data Attributes
div.quantity.single_add_to_cart_button span.single_add_to_cart_button span i:before
Shortcode Output
<div class="sticky_atc_btn"><div class="wrapper-content"><div class="sticky_atc_btn-row">
FAQ

Frequently Asked Questions about Sticky Add to Cart