Sticky CPT Security & Risk Analysis

wordpress.org/plugins/sticky-cpt

Add the possibility of "sticky" CPT. (Gutenberg compatibility)

50 active installs v2.0.0 PHP + WP 3.5+ Updated Mar 19, 2020
cptforwardhighlightingpushsticky
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Sticky CPT Safe to Use in 2026?

Generally Safe

Score 85/100

Sticky CPT has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The plugin 'sticky-cpt' v2.0.0 exhibits a generally positive security posture based on the provided static analysis and vulnerability history. The absence of any known CVEs and the lack of identified critical or high-severity issues in the vulnerability history suggest a history of stable and secure development. The static analysis further reinforces this, indicating no direct entry points for attacks such as unprotected AJAX handlers, REST API routes, shortcodes, or cron events. Additionally, the absence of dangerous functions and external HTTP requests is a strong indicator of good security practices.

However, there are some notable areas of concern that prevent a perfect score. The presence of a single SQL query that does not utilize prepared statements is a potential risk, as it could be susceptible to SQL injection if the input is not rigorously sanitized elsewhere. Furthermore, all identified output operations are not properly escaped, which opens the door to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is ever rendered without proper sanitization. The complete lack of nonce checks and the limited number of capability checks also present a potential weakness, as these are crucial for preventing unauthorized actions and CSRF attacks in WordPress plugins. While the attack surface is reported as zero, the unescaped outputs and the raw SQL query represent implicit vulnerabilities that could be exploited.

In conclusion, 'sticky-cpt' v2.0.0 appears to be a relatively secure plugin with a good track record. The lack of known vulnerabilities and a well-controlled attack surface are significant strengths. Nevertheless, the identified issues regarding SQL prepared statements and output escaping, alongside the absence of nonce and comprehensive capability checks, represent tangible risks that should be addressed to further harden the plugin's security.

Key Concerns

  • SQL query without prepared statements
  • Output not properly escaped
  • No nonce checks implemented
  • Limited capability checks
Vulnerabilities
None known

Sticky CPT Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Sticky CPT Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped3 total outputs
Attack Surface

Sticky CPT Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actionadmin_initincludes\class-sticky-cpt-loader.php:14
actionadmin_footer-post.phpincludes\class-sticky-cpt-loader.php:16
actionadmin_footer-post-new.phpincludes\class-sticky-cpt-loader.php:17
actionadmin_footer-edit.phpincludes\class-sticky-cpt-loader.php:18
actionenqueue_block_editor_assetsincludes\class-sticky-cpt-loader.php:20
actioninitincludes\class-sticky-cpt-loader.php:22
actionadded_post_metaincludes\class-sticky-cpt-loader.php:24
actionupdated_post_metaincludes\class-sticky-cpt-loader.php:25
actiondeleted_post_metaincludes\class-sticky-cpt-loader.php:26
actionadd_option_sticky_postsincludes\class-sticky-cpt-loader.php:28
actionupdate_option_sticky_postsincludes\class-sticky-cpt-loader.php:29
actionadmin_noticesincludes\class-sticky-cpt-loader.php:32
Maintenance & Trust

Sticky CPT Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedMar 19, 2020
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs50
Developer Profile

Sticky CPT Developer Profile

Kantari Samy

4 plugins · 460 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sticky CPT

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sticky-cpt/gut/js/blocks.js/wp-content/plugins/sticky-cpt/gut/js/info.js
Script Paths
/wp-content/plugins/sticky-cpt/gut/js/blocks.js/wp-content/plugins/sticky-cpt/gut/js/info.js

HTML / DOM Fingerprints

CSS Classes
sticky-cpt-editor-notice
Data Attributes
data-sticky-cpt-id
JS Globals
sticky_cpt_admin
REST Endpoints
/wp-json/sticky-cpt/v1/posts
FAQ

Frequently Asked Questions about Sticky CPT