StickyBoard Security & Risk Analysis

wordpress.org/plugins/stickyboard

ログインユーザーがWebページに付箋を追加できるようにするプラグイン。Create personal sticky notes on any WordPress page.

0 active installs v1.1.0 PHP 7.0+ WP 5.0+ Updated Apr 30, 2025
annotationsmemonotespersonal-notessticky-notes
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is StickyBoard Safe to Use in 2026?

Generally Safe

Score 100/100

StickyBoard has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11mo ago
Risk Assessment

The stickyboard plugin v1.1.0 exhibits a generally strong security posture based on the static analysis. The absence of dangerous functions, file operations, and external HTTP requests is a positive sign. Furthermore, the high percentage of SQL queries using prepared statements and properly escaped output suggests good development practices regarding data handling and preventing cross-site scripting (XSS) vulnerabilities. The limited attack surface, with all entry points having permission checks, is also commendable. The plugin also has no recorded vulnerability history, which further reinforces its perceived security.

However, a notable concern is the complete lack of capability checks in conjunction with REST API routes. While these routes do have permission callbacks, the absence of specific capability checks means that access control might be broader than intended, potentially allowing users with less privileged roles to perform actions they shouldn't. The limited number of nonce checks (only 2) also raises a slight concern for potential Cross-Site Request Forgery (CSRF) vulnerabilities, although without specific flows identified, this remains a theoretical risk. The absence of any recorded historical vulnerabilities is a strength, indicating consistent secure development, but it doesn't negate the need to scrutinize the current code for potential weaknesses.

In conclusion, stickyboard v1.1.0 appears to be a securely developed plugin with robust data handling. The primary areas for potential improvement lie in refining access control for its REST API endpoints by incorporating specific capability checks and potentially increasing the number of nonce checks to mitigate CSRF risks more thoroughly. The lack of historical vulnerabilities is a significant positive, but the current analysis reveals areas where security could be further hardened.

Key Concerns

  • REST API routes lack capability checks
  • Low number of nonce checks
Vulnerabilities
None known

StickyBoard Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

StickyBoard Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
17 prepared
Unescaped Output
8
104 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

85% prepared20 total queries

Output Escaping

93% escaped112 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<my-notes> (templates\my-notes.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

StickyBoard Attack Surface

Entry Points4
Unprotected0

REST API Routes 4

GET/wp-json/stickyboard/v1/notesstickyboard.php:428
POST/wp-json/stickyboard/v1/notesstickyboard.php:434
PUT/wp-json/stickyboard/v1/notes/(?P<id>\d+)stickyboard.php:440
DELETE/wp-json/stickyboard/v1/notes/(?P<id>\d+)stickyboard.php:446
WordPress Hooks 6
actioninitstickyboard.php:30
actionwp_enqueue_scriptsstickyboard.php:33
actionadmin_menustickyboard.php:36
actionadmin_initstickyboard.php:39
actionrest_api_initstickyboard.php:42
actionwp_footerstickyboard.php:58
Maintenance & Trust

StickyBoard Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 30, 2025
PHP min version7.0
Downloads352

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

StickyBoard Developer Profile

ネトデジ編集部

3 plugins · 80 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect StickyBoard

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/stickyboard/assets/css/stickyboard.css/wp-content/plugins/stickyboard/assets/js/stickyboard.js
Script Paths
/wp-content/plugins/stickyboard/assets/js/stickyboard.js
Version Parameters
stickyboard.css?ver=stickyboard.js?ver=

HTML / DOM Fingerprints

JS Globals
stickyBoard
REST Endpoints
/stickyboard/v1
FAQ

Frequently Asked Questions about StickyBoard