SV Sticky Menu Security & Risk Analysis

wordpress.org/plugins/sv-sticky-menu

SV Sticky Menu is WordPress\'s plugin that create sticky menu on top of page. Plugin helps easy and quickly set menu as sticky with transition.

10 active installs v1.0.5 PHP + WP 4.0+ Updated Sep 11, 2017
fixedmenustickytoptransiton
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SV Sticky Menu Safe to Use in 2026?

Generally Safe

Score 85/100

SV Sticky Menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "sv-sticky-menu" plugin, version 1.0.5, exhibits a strong static security posture based on the provided analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface. Furthermore, the lack of dangerous functions, file operations, external HTTP requests, and the exclusive use of prepared statements for SQL queries are excellent security practices.

However, a notable concern arises from the output escaping, with 55% of outputs being properly escaped. This indicates a potential for cross-site scripting (XSS) vulnerabilities if user-provided data is not consistently sanitized before being displayed. The absence of nonce checks and capability checks, while less critical given the limited attack surface, could become a weakness if new entry points are introduced in future versions without proper security measures. The plugin's vulnerability history is clean, showing no recorded CVEs, which is a positive sign of its current security status.

In conclusion, "sv-sticky-menu" version 1.0.5 is generally secure due to its minimal attack surface and good SQL handling. The primary area for improvement and potential risk lies in ensuring robust output escaping for all user-generated content to prevent XSS attacks. The lack of past vulnerabilities is reassuring, but developers should remain vigilant in implementing proper security checks as the plugin evolves.

Key Concerns

  • Output escaping is not consistently applied (55% proper)
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

SV Sticky Menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

SV Sticky Menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
33
41 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

55% escaped74 total outputs
Attack Surface

SV Sticky Menu Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menusv-sticky-menu.php:41
actionadmin_initsv-sticky-menu.php:42
actionadmin_enqueue_scriptssv-sticky-menu.php:43
actionwp_headsv-sticky-menu.php:500
actionwp_enqueue_scriptssv-sticky-menu.php:524
Maintenance & Trust

SV Sticky Menu Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedSep 11, 2017
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

SV Sticky Menu Developer Profile

andreysv

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SV Sticky Menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sv-sticky-menu/js/features-adm.js
Script Paths
/wp-content/plugins/sv-sticky-menu/js/features-adm.js
Version Parameters
sv-sticky-menu/js/features-adm.js?ver=

HTML / DOM Fingerprints

CSS Classes
colorfield
Data Attributes
name="sv-sticky-menu-page-options[field_css_selector]"id="field_css_selector"name="sv-sticky-menu-page-options[field_css_hide]"id="field_css_hide"name="sv-sticky-menu-page-options[field_set_bgcolor]"id="field_set_bgcolor"+2 more
FAQ

Frequently Asked Questions about SV Sticky Menu