Sticky Recent Random Posts Security & Risk Analysis

wordpress.org/plugins/sticky-recent-random-posts

Sticky Recent Random Posts Plugin lets user to add sticky bar at bottom.

10 active installs v1.2 PHP + WP 3.5+ Updated Aug 17, 2016
random-postrecent-postrecent-random-poststicky-random-postssticky-recent-random-post
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Sticky Recent Random Posts Safe to Use in 2026?

Generally Safe

Score 85/100

Sticky Recent Random Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The 'sticky-recent-random-posts' plugin version 1.2 presents a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities (CVEs) and doesn't appear to have a large attack surface with 0 entry points, including AJAX handlers, REST API routes, shortcodes, and cron events. Furthermore, all detected SQL queries utilize prepared statements, which is a strong security practice.

However, significant concerns arise from the static analysis. The presence of the `unserialize` function, a known source of potential vulnerabilities if used with untrusted input, is a critical red flag, especially as 0% of outputs are properly escaped. The taint analysis revealing 2 flows with unsanitized paths, though not classified as critical or high severity, further emphasizes the risk associated with handling potentially malicious data. The complete lack of nonce and capability checks on any code signals also means that if any of these functions were to be exposed or if the plugin's functionality changes in future versions, there are no built-in safeguards against unauthorized actions.

In conclusion, while the plugin has a clean vulnerability history and a small attack surface, the use of `unserialize` without proper output escaping and the absence of basic security checks like nonces and capability checks represent substantial weaknesses. These could be exploited if user-controlled data is involved in the unserialization process or if an attack vector to these functions emerges. The plugin's developers need to address the unescaped output and the potential risks associated with `unserialize`.

Key Concerns

  • Dangerous function `unserialize` present
  • 0% of outputs properly escaped
  • Taint flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Sticky Recent Random Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Sticky Recent Random Posts Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
17
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$get_saved_data=unserialize($get_saved_data);sticky-recent-random-posts.php:35
unserialize$get_saved_data=unserialize($get_saved_data);sticky-recent-random-posts.php:62
unserialize$get_saved_data=unserialize($get_saved_data);sticky-recent-random-posts.php:186

Output Escaping

0% escaped17 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
mn_display_custom_page_content (sticky-recent-random-posts.php:53)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Sticky Recent Random Posts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menusticky-recent-random-posts.php:174
actionadmin_enqueue_scriptssticky-recent-random-posts.php:176
actionwp_footersticky-recent-random-posts.php:278
Maintenance & Trust

Sticky Recent Random Posts Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedAug 17, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Sticky Recent Random Posts Developer Profile

mahavirnahata

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sticky Recent Random Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
mn_individual_block
Data Attributes
id="mn_settings_form"name="mn_post_data"id="mn_display_bar_location"name="mn_display_bar_location"id="mn_anchor_text_font_weight"name="mn_anchor_text_font_weight"+26 more
FAQ

Frequently Asked Questions about Sticky Recent Random Posts