Sticky Block for Gutenberg Editor Security & Risk Analysis

wordpress.org/plugins/sticky-block

The Gutenberg Sticky Block will stick at the top of the page once you scroll down.

7K active installs v1.11.1 PHP + WP 5.0+ Updated Jan 14, 2026
gutenbergstickysticky-block
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Sticky Block for Gutenberg Editor Safe to Use in 2026?

Generally Safe

Score 100/100

Sticky Block for Gutenberg Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The 'sticky-block' plugin v1.11.1 presents a strong security posture based on the provided static analysis and vulnerability history. The code analysis shows no evidence of dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, or any identified taint flows, indicating good coding practices in these critical areas. Furthermore, the absence of any recorded CVEs, both historical and current, is a significant positive indicator of the plugin's security track record.

While the static analysis highlights a lack of identified vulnerabilities in the examined code, it's important to note the complete absence of capability checks and nonce checks. Although the attack surface appears to be zero in terms of AJAX handlers, REST API routes, shortcodes, and cron events, this lack of explicit checks could represent a potential blind spot if new entry points are introduced in future versions or if the plugin relies on other mechanisms for authorization that are not captured in this analysis.

In conclusion, 'sticky-block' v1.11.1 exhibits a very low risk profile due to its clean code analysis and spotless vulnerability history. The primary area for caution is the reported zero nonce and capability checks, which, while not posing an immediate threat given the current zero attack surface, represent a departure from best practices for securing WordPress components and could become a concern if the plugin's functionality expands.

Key Concerns

  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Sticky Block for Gutenberg Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Sticky Block for Gutenberg Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Sticky Block for Gutenberg Editor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitsrc\init.php:59
actionwp_enqueue_scriptssrc\init.php:60
Maintenance & Trust

Sticky Block for Gutenberg Editor Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 14, 2026
PHP min version
Downloads46K

Community Trust

Rating92/100
Number of ratings11
Active installs7K
Developer Profile

Sticky Block for Gutenberg Editor Developer Profile

Senff - a11n

7 plugins · 9K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
1004 days
View full developer profile
Detection Fingerprints

How We Detect Sticky Block for Gutenberg Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sticky-block/dist/blocks.build.js/wp-content/plugins/sticky-block/dist/blocks.style.build.css/wp-content/plugins/sticky-block/dist/blocks.editor.build.css/wp-content/plugins/sticky-block/dist/sticky-block.min.js
Script Paths
/wp-content/plugins/sticky-block/dist/blocks.build.js/wp-content/plugins/sticky-block/dist/sticky-block.min.js
Version Parameters
sticky-block/dist/blocks.build.js?ver=1.11.1sticky-block/dist/blocks.style.build.css?ver=1.11.1sticky-block/dist/blocks.editor.build.css?ver=1.11.1sticky-block/dist/sticky-block.min.js?ver=1.0

HTML / DOM Fingerprints

JS Globals
cgbGlobal
FAQ

Frequently Asked Questions about Sticky Block for Gutenberg Editor