Admin Menu Restrictor Security & Risk Analysis

wordpress.org/plugins/admin-menu-restrictor

Restricts the WordPress admin menu for non-admin users, showing only the \"Posts\" menu to simplify the interface and enhance security.

0 active installs v1.1 PHP 5.6+ WP 5.0+ Updated Nov 26, 2024
access-controladmin-menurestrict-menuuser-roleswordpress-admin
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Admin Menu Restrictor Safe to Use in 2026?

Generally Safe

Score 92/100

Admin Menu Restrictor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'admin-menu-restrictor' plugin v1.1 exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, or external HTTP requests is a significant strength. The plugin also demonstrates good practice by exclusively using prepared statements for its SQL queries and ensuring all outputs are properly escaped. Furthermore, the presence of at least one capability check indicates that it attempts to enforce access controls, which is a fundamental security measure. The vulnerability history also shows a clean slate, with no known CVEs ever recorded, suggesting a history of secure development or minimal exposure to common attack vectors.

However, the static analysis also reveals a complete lack of identified entry points, including AJAX handlers, REST API routes, shortcodes, and cron events. While this might indicate a very focused and secure plugin, it also means there are no observed points for the analysis to deeply inspect for issues like missing nonces or insufficient permission checks. The fact that zero taint flows were analyzed, and zero unsanitized paths were found, could be a direct result of this limited attack surface exposure for static analysis. It's important to acknowledge that the absence of identified issues could be due to the limited scope of analysis or the plugin's extremely minimal functionality, rather than absolute guaranteed security.

In conclusion, the 'admin-menu-restrictor' plugin v1.1 appears to be developed with security in mind, adhering to many best practices and lacking any known vulnerabilities. The code signals and clean vulnerability history are highly encouraging. The primary area of caution stems from the completely absent attack surface reported by the static analysis, which limits the ability to definitively confirm robust protection across all potential interaction points. This suggests that while the plugin is likely safe for its intended, and seemingly limited, purpose, further dynamic testing or more comprehensive static analysis might be warranted if the plugin were to evolve or integrate more deeply with WordPress functionalities.

Key Concerns

  • No identified entry points for analysis
  • No taint flows analyzed
  • No identified dangerous functions
  • 100% SQL prepared statements
  • 100% output escaping
  • No file operations
  • No external HTTP requests
  • No nonce checks found
  • Vulnerability history clean
Vulnerabilities
None known

Admin Menu Restrictor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Admin Menu Restrictor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Admin Menu Restrictor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menuadmin-menu-restrictor.php:12
Maintenance & Trust

Admin Menu Restrictor Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 26, 2024
PHP min version5.6
Downloads929

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Admin Menu Restrictor Developer Profile

Ram Vaithia Nathan

1 plugin · 0 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Admin Menu Restrictor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Admin Menu Restrictor