Admin Menu Security & Risk Analysis

wordpress.org/plugins/admin-menu-creator

Admin Menu helps you to create custom admin menu and sub menus etc provided by pixeltoweb.com

0 active installs v1.0.0 PHP + WP 3.0.1+ Updated Jul 3, 2018
adminmenuspixelpixeltowebwordpress-admin-menus
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Admin Menu Safe to Use in 2026?

Generally Safe

Score 85/100

Admin Menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The plugin 'admin-menu-creator' v1.0.0 exhibits a mixed security posture. On one hand, the absence of known vulnerabilities and a relatively clean bill of health in its vulnerability history suggest a level of care in its development. The plugin also avoids common risky practices such as file operations, external HTTP requests, and bundling external libraries. However, the static analysis reveals significant concerns. The code shows a concerning lack of capability checks and nonce verification, which are fundamental security mechanisms in WordPress. Furthermore, the taint analysis indicates that all analyzed flows (3 total) involve unsanitized paths, with two of these being flagged as high severity. This strongly suggests a potential for input validation and sanitization issues that could be exploited, despite the absence of explicit SQL injection findings from prepared statement usage. The low percentage of properly escaped output (57%) is also a notable weakness, increasing the risk of cross-site scripting (XSS) vulnerabilities.

Key Concerns

  • High severity taint flows found
  • All taint flows have unsanitized paths
  • No capability checks implemented
  • No nonce checks implemented
  • Low percentage of output escaping
Vulnerabilities
None known

Admin Menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Admin Menu Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Admin Menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
10 prepared
Unescaped Output
25
33 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

71% prepared14 total queries

Output Escaping

57% escaped58 total outputs
Data Flows · Security
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
<admin_menu_listing_details> (admin\admin_menu_listing_details.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Admin Menu Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitadminmenucreator.php:28
actioninitadminmenucreator.php:29
actionadmin_menuclass.function.php:37
actionadmin_enqueue_scriptsclass.function.php:38
Maintenance & Trust

Admin Menu Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJul 3, 2018
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Admin Menu Developer Profile

pixeltoweb

3 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Admin Menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/admin-menu-creator/css/adminMenuCreator.css/wp-content/plugins/admin-menu-creator/css/adminMenuCreatorBackend.css
Script Paths
/wp-content/plugins/admin-menu-creator/js/adminMenuCreator.js

HTML / DOM Fingerprints

CSS Classes
wrap
JS Globals
counter
FAQ

Frequently Asked Questions about Admin Menu