WPWing Sticky Block Security & Risk Analysis

wordpress.org/plugins/wpwing-sticky-block

The WPWing Sticky Block will stick at the top with an optional offset pixel of the page once you scroll down.

0 active installs v1.0.1 PHP 7.0+ WP 5.8+ Updated Jul 5, 2022
block-editorgutenbergstickysticky-block
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WPWing Sticky Block Safe to Use in 2026?

Generally Safe

Score 85/100

WPWing Sticky Block has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The static analysis of wpwing-sticky-block v1.0.1 reveals a strong security posture regarding direct code execution and data manipulation. The absence of dangerous functions, file operations, external HTTP requests, and the use of prepared statements for all SQL queries are excellent practices. Furthermore, all identified output is properly escaped, and there are no recorded vulnerabilities (CVEs) in its history. This indicates a well-written and secure plugin from a coding perspective.

However, the analysis also highlights a concerning lack of security checks for its entry points. With zero AJAX handlers, REST API routes, shortcodes, or cron events, the plugin appears to have no user-facing interaction points. If this is intentional, it's a positive sign. But if there are *intended* interaction points that are not being analyzed or are missing these checks, it presents a significant risk. The complete absence of nonce checks and capability checks, even with zero identified entry points, raises a red flag for potential future expansion or if the analysis did not cover all interaction methods.

In conclusion, while the code itself is clean and free from common vulnerabilities like raw SQL or unescaped output, the lack of any documented security checks on its (currently non-existent) attack surface is a notable weakness. The plugin demonstrates good internal coding hygiene but lacks explicit security validation mechanisms for its interaction points, which could become an issue if the plugin evolves or if the attack surface was incompletely reported.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

WPWing Sticky Block Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WPWing Sticky Block Release Timeline

v1.0.1Current
Code Analysis
Analyzed Apr 16, 2026

WPWing Sticky Block Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WPWing Sticky Block Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitwpwing-sticky-block.php:29
actionwp_enqueue_scriptswpwing-sticky-block.php:47
Maintenance & Trust

WPWing Sticky Block Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedJul 5, 2022
PHP min version7.0
Downloads774

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

WPWing Sticky Block Developer Profile

WPWing

3 plugins · 10 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WPWing Sticky Block

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpwing-sticky-block/sticky-block.js
Script Paths
/wp-content/plugins/wpwing-sticky-block/sticky-block.js
Version Parameters
wpwing-sticky-block/sticky-block.js?ver=1.0.0

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WPWing Sticky Block