Sticky Editor Security & Risk Analysis

wordpress.org/plugins/sticky-editor

Use a mceToolbar continuously while writing the content (as our text grows inside the editor box) for the page or post.

10 active installs v1.4 PHP + WP 3.0+ Updated Jun 27, 2014
editormcetoolbarpoststickytinymce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Sticky Editor Safe to Use in 2026?

Generally Safe

Score 85/100

Sticky Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "sticky-editor" v1.4 plugin exhibits an exceptionally strong security posture. The absence of any identified vulnerabilities in its history, coupled with a clean bill of health from the static analysis, suggests a development team that prioritizes security. The plugin demonstrates excellent adherence to best practices, with no dangerous functions, all SQL queries using prepared statements, and all outputs properly escaped. Furthermore, the lack of any identified entry points in the code without proper authentication or capability checks is a significant strength.

While the absence of identified issues is positive, it's important to note that a complete lack of any potential entry points (AJAX, REST API, shortcodes, cron) and zero taint flows analyzed might indicate a very simple plugin or potentially limited analysis scope. However, given the other strong indicators, this is more likely a testament to a well-secured, potentially narrowly focused, plugin. The plugin's history of zero known CVEs further reinforces this positive assessment. In conclusion, "sticky-editor" v1.4 appears to be a very secure plugin, demonstrating rigorous security practices and a history free of known vulnerabilities.

Vulnerabilities
None known

Sticky Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Sticky Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Sticky Editor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_headsticky-editor.php:14
actionadmin_enqueue_scriptssticky-editor.php:41
Maintenance & Trust

Sticky Editor Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedJun 27, 2014
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Sticky Editor Developer Profile

Carlos Miguel Silva

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sticky Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sticky-editor/js/sticky-editor.js
Script Paths
/wp-content/plugins/sticky-editor/js/sticky-editor.js

HTML / DOM Fingerprints

CSS Classes
fixed-div-mceEditorrot-90
FAQ

Frequently Asked Questions about Sticky Editor