
WP Sticky Button – Click to Chat Security & Risk Analysis
wordpress.org/plugins/wa-sticky-buttonDisplay the beautiful WhatsApp Sticky Button on the WordPress frontend.
Is WP Sticky Button – Click to Chat Safe to Use in 2026?
Generally Safe
Score 99/100WP Sticky Button – Click to Chat has a strong security track record. Known vulnerabilities have been patched promptly.
The wa-sticky-button v1.4.1 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for SQL queries, avoiding file operations and external HTTP requests, and performing nonce and capability checks. The taint analysis also shows no critical or high-severity unsanitized flows, indicating a generally safe internal code structure.
However, significant concerns arise from the plugin's attack surface and historical vulnerability data. The presence of one AJAX handler without authentication checks presents a direct entry point for potential exploitation, which is a critical oversight. Furthermore, the plugin has a history of two known CVEs, including a high and a medium severity vulnerability, with the last one occurring in August 2022. The common vulnerability types found in its history, namely Missing Authorization and Cross-site Scripting, align with the observed unprotected AJAX handler, suggesting a pattern of insecure handling of user-supplied input and access control.
In conclusion, while the plugin has made some strides in secure coding practices such as prepared statements and output escaping, the unprotected AJAX endpoint and its historical vulnerability record are significant weaknesses. The lack of authorization on an entry point is a critical flaw that could be exploited. Users should exercise caution and consider the plugin's past issues when deciding to use it.
Key Concerns
- AJAX handler without authentication
- High severity vulnerability historically
- Medium severity vulnerability historically
- History of Missing Authorization vulnerabilities
- History of Cross-site Scripting vulnerabilities
WP Sticky Button – Click to Chat Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
WP Sticky Button <= 1.4 - Missing Authorization to Arbitrary Settings Update
WP Sticky Button <= 1.3 - Unauthenticated Stored Cross-Site Scripting
WP Sticky Button – Click to Chat Code Analysis
Output Escaping
Data Flow Analysis
WP Sticky Button – Click to Chat Attack Surface
AJAX Handlers 1
WordPress Hooks 3
Maintenance & Trust
WP Sticky Button – Click to Chat Maintenance & Trust
Maintenance Signals
Community Trust
WP Sticky Button – Click to Chat Alternatives
Chat Widget: Floating Customer Support Button for 30+ Channels, Supporting SMS, Calls, and Chat – Bit Assist
bit-assist
Floating sticky chat button for WhatsApp Chat, Facebook Messenger, Telegram, Instagram, SMS, Call, Discord chat, TikTok, Line & 30+ channels
Cresta Help Chat
cresta-whatsapp-chat
Allow your users and customers to contact you via WhatsApp with a single click.
Add Chat App Button
add-whatsapp-button
Add Chat App Button enables adding a customizeable click-to-chat button that opens a chat on WhatsApp. This plugin is not affiliated with WhatsApp or …
Button
button
Create beautiful buttons and social icons. Button plugin is powerful and easy to use. You can create any types of buttons such as css3 & 3D Buttons.
Click to Call or Chat Buttons
click-to-call-or-chat-buttons
This plugin adds Phone Call and WhatsApp button on your webpage.
WP Sticky Button – Click to Chat Developer Profile
2 plugins · 11K total installs
How We Detect WP Sticky Button – Click to Chat
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
okapi-wasb-chat