Admin in menu Security & Risk Analysis

wordpress.org/plugins/admin-in-menu

С этим плагином вы можете убрать стандартную админ-панель вордпресса для пользователей с уровнем доступа "подписчик".

10 active installs v1.3.2 PHP + WP 4.6+ Updated Mar 1, 2018
adminadmin-panel%d0%b0%d0%b4%d0%bc%d0%b8%d0%bd-%d0%bf%d0%b0%d0%bd%d0%b5%d0%bb%d1%8c%d0%b0%d0%b4%d0%bc%d0%b8%d0%bd%d0%ba%d0%b0%d1%88%d0%be%d1%80%d1%82%d0%ba%d0%be%d0%b4
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Admin in menu Safe to Use in 2026?

Generally Safe

Score 85/100

Admin in menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "admin-in-menu" plugin, in version 1.3.2, exhibits a generally good security posture based on the provided static analysis. The absence of any known CVEs and the lack of critical or high-severity vulnerabilities in its history suggest a history of responsible development and patching. The code analysis reveals no dangerous functions, no direct SQL queries, and no external HTTP requests, which are all positive indicators. Furthermore, the fact that all entry points are protected by some form of authentication is a significant strength.

However, there are areas for improvement. A notable concern is the low percentage of properly escaped output (31%). This indicates a potential for Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled with sufficient care before being displayed. While no taint flows were identified, this might be due to the limited scope of the analysis or the specific data used. The complete absence of nonce checks on any entry points, even though they appear to have capability checks, is a missed opportunity to further strengthen defenses against CSRF attacks.

In conclusion, "admin-in-menu" v1.3.2 has a solid foundation with no known critical flaws or historical vulnerabilities. The primary weakness lies in output escaping, which requires attention to prevent potential XSS. The lack of nonce checks, while not explicitly leading to an identified vulnerability in this analysis, represents a gap in standard WordPress security practices that should be addressed to further harden the plugin.

Key Concerns

  • Low percentage of properly escaped output
  • No nonce checks on entry points
Vulnerabilities
None known

Admin in menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Admin in menu Release Timeline

v1.1
v1.1.0
Code Analysis
Analyzed Mar 17, 2026

Admin in menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
18
8 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

31% escaped26 total outputs
Attack Surface

Admin in menu Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[admin-in-menu-user] includes\class-admin-in-menu.php:267
[admin-in-menu-auth] includes\class-admin-in-menu.php:268
[admin-in-menu-reg] includes\class-admin-in-menu.php:269
WordPress Hooks 10
actionplugins_loadedincludes\class-admin-in-menu.php:141
actionadmin_enqueue_scriptsincludes\class-admin-in-menu.php:156
actionadmin_enqueue_scriptsincludes\class-admin-in-menu.php:157
actionwp_enqueue_scriptsincludes\class-admin-in-menu.php:172
actionwp_enqueue_scriptsincludes\class-admin-in-menu.php:173
actioninitincludes\class-admin-in-menu.php:261
filterregistration_redirectincludes\class-admin-in-menu.php:262
filterlogin_redirectincludes\class-admin-in-menu.php:263
filterlogout_redirectincludes\class-admin-in-menu.php:264
filterwidget_textincludes\class-admin-in-menu.php:265
Maintenance & Trust

Admin in menu Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMar 1, 2018
PHP min version
Downloads9K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Admin in menu Developer Profile

fatoom

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Admin in menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/admin-in-menu/admin/css/admin-in-menu-admin.css/wp-content/plugins/admin-in-menu/admin/js/admin-in-menu-admin.js
Script Paths
/wp-content/plugins/admin-in-menu/admin/js/admin-in-menu-admin.js
Version Parameters
admin-in-menu-admin.css?ver=admin-in-menu-admin.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Admin in menu