Sticky Custom Post Types Security & Risk Analysis

wordpress.org/plugins/sticky-custom-post-types

Enables support for sticky custom post types.

600 active installs v1.2.3 PHP + WP 3.0+ Updated Sep 29, 2012
custom-post-typessticky
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Sticky Custom Post Types Safe to Use in 2026?

Generally Safe

Score 85/100

Sticky Custom Post Types has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The 'sticky-custom-post-types' plugin v1.2.3 exhibits a generally strong security posture based on the provided static analysis. The absence of detected dangerous functions, raw SQL queries, file operations, and external HTTP requests is commendable. Furthermore, the plugin demonstrates good practices in handling SQL queries with prepared statements and a high percentage of properly escaped outputs, which helps mitigate Cross-Site Scripting (XSS) risks.

The analysis reveals a remarkably small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. This significantly limits potential entry points for attackers. The presence of a capability check, although only one, is a positive sign, indicating some awareness of access control.

The plugin's vulnerability history is exceptionally clean, with no known CVEs recorded. This, combined with the lack of critical or high severity taint flows, suggests a well-maintained and secure codebase. Overall, this plugin appears to be a low-risk option. However, the complete absence of nonce checks across all potential entry points (even though there are none detected) could become a concern if the attack surface were to expand in future versions without corresponding security updates.

Key Concerns

  • No nonce checks detected
  • Lower output escaping percentage (80%)
Vulnerabilities
None known

Sticky Custom Post Types Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Sticky Custom Post Types Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
8 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

80% escaped10 total outputs
Attack Surface

Sticky Custom Post Types Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initsticky-custom-post-types.php:28
actionadmin_initsticky-custom-post-types.php:29
actionpre_get_postssticky-custom-post-types.php:30
Maintenance & Trust

Sticky Custom Post Types Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedSep 29, 2012
PHP min version
Downloads18K

Community Trust

Rating70/100
Number of ratings6
Active installs600
Developer Profile

Sticky Custom Post Types Developer Profile

superann

3 plugins · 670 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sticky Custom Post Types

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
selectit
Data Attributes
name="sticky"name="sticky_custom_post_types[]"name="sticky_custom_post_types_filters[]"id="super-sticky"id="sticky_custom_post_types_filters_home"id="post_type_post"
FAQ

Frequently Asked Questions about Sticky Custom Post Types