
Sticky CPT Security & Risk Analysis
wordpress.org/plugins/sticky-cptAdd the possibility of "sticky" CPT. (Gutenberg compatibility)
Is Sticky CPT Safe to Use in 2026?
Generally Safe
Score 85/100Sticky CPT has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin 'sticky-cpt' v2.0.0 exhibits a generally positive security posture based on the provided static analysis and vulnerability history. The absence of any known CVEs and the lack of identified critical or high-severity issues in the vulnerability history suggest a history of stable and secure development. The static analysis further reinforces this, indicating no direct entry points for attacks such as unprotected AJAX handlers, REST API routes, shortcodes, or cron events. Additionally, the absence of dangerous functions and external HTTP requests is a strong indicator of good security practices.
However, there are some notable areas of concern that prevent a perfect score. The presence of a single SQL query that does not utilize prepared statements is a potential risk, as it could be susceptible to SQL injection if the input is not rigorously sanitized elsewhere. Furthermore, all identified output operations are not properly escaped, which opens the door to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is ever rendered without proper sanitization. The complete lack of nonce checks and the limited number of capability checks also present a potential weakness, as these are crucial for preventing unauthorized actions and CSRF attacks in WordPress plugins. While the attack surface is reported as zero, the unescaped outputs and the raw SQL query represent implicit vulnerabilities that could be exploited.
In conclusion, 'sticky-cpt' v2.0.0 appears to be a relatively secure plugin with a good track record. The lack of known vulnerabilities and a well-controlled attack surface are significant strengths. Nevertheless, the identified issues regarding SQL prepared statements and output escaping, alongside the absence of nonce and comprehensive capability checks, represent tangible risks that should be addressed to further harden the plugin's security.
Key Concerns
- SQL query without prepared statements
- Output not properly escaped
- No nonce checks implemented
- Limited capability checks
Sticky CPT Security Vulnerabilities
Sticky CPT Code Analysis
SQL Query Safety
Output Escaping
Sticky CPT Attack Surface
WordPress Hooks 12
Maintenance & Trust
Sticky CPT Maintenance & Trust
Maintenance Signals
Community Trust
Sticky CPT Alternatives
Sticky Posts – Switch
sticky-posts-switch
This plugin adds a sticky post switch functionality to the admin list post/custom post type pages.
Custom Post Type Sticky
custom-post-type-sticky
Extends sticky post functionality to custom post types in a way that is identical to default posts.
Sticky Header Effects for Elementor
sticky-header-effects-for-elementor
Create advanced Sticky Headers in Elementor Free or Pro with scroll effects, blur, shrink, hide on scroll & full responsive controls.
WP Migrate Lite – Migration Made Easy
wp-migrate-db
Migrate your database. Export full sites including media, themes, and plugins. Find and replace content with support for serialized data.
My Sticky Bar – Floating Notification Bar & Sticky Header (formerly myStickymenu)
mystickymenu
Create a welcome notification bar for your website. Also, My Sticky Bar plugin can make your menu or header sticky to the top when scrolled 📌
Sticky CPT Developer Profile
4 plugins · 460 total installs
How We Detect Sticky CPT
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/sticky-cpt/gut/js/blocks.js/wp-content/plugins/sticky-cpt/gut/js/info.js/wp-content/plugins/sticky-cpt/gut/js/blocks.js/wp-content/plugins/sticky-cpt/gut/js/info.jsHTML / DOM Fingerprints
sticky-cpt-editor-noticedata-sticky-cpt-idsticky_cpt_admin/wp-json/sticky-cpt/v1/posts