
AllWebMenus WordPress Menu Plugin Security & Risk Analysis
wordpress.org/plugins/allwebmenus-wordpress-menu-pluginRequires commercial (paid) software: AllWebMenus PRO (v5.3.926+)
Is AllWebMenus WordPress Menu Plugin Safe to Use in 2026?
Mostly Safe
Score 81/100AllWebMenus WordPress Menu Plugin is generally safe to use though it hasn't been updated recently. 3 past CVEs were resolved. Keep it updated.
The "allwebmenus-wordpress-menu-plugin" v1.1.24 exhibits a concerning security posture, primarily due to its outdated vulnerability history and significant code-level weaknesses. While the static analysis reports a seemingly small attack surface and a lack of immediate critical taint flows, this is overshadowed by the critical historical vulnerabilities, specifically "Unrestricted Upload of File with Dangerous Type" and "PHP Remote File Inclusion." The fact that these critical vulnerabilities are present, even if currently patched (indicated by 0 unpatched CVEs), suggests a history of severe insecure coding practices within the plugin. The code analysis further reveals a lack of output escaping (only 1% properly escaped) and no capability checks for a cron event, which, when combined with the historical RFI vulnerabilities, presents a substantial risk. The heavy reliance on raw SQL queries without prepared statements is another significant concern, increasing the susceptibility to SQL injection attacks. Despite the absence of reported critical taint flows in the *current* analysis, the plugin's past and ongoing coding deficiencies make it a high-risk component. Users should exercise extreme caution, prioritize updating to a version that has addressed these fundamental issues, and consider replacing the plugin if these issues persist in newer versions.
Key Concerns
- No capability checks on cron events
- Severe lack of output escaping
- 100% of SQL queries use raw statements
- 3 historical critical CVEs (RFI, Unrestricted Upload)
AllWebMenus WordPress Menu Plugin Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
AllWebMenus WordPress Menu Plugin <= 1.1.8 - Arbitrary File Upload
AllWebMenus WordPress Menu Plugin < 1.1.9 - Arbitrary File Upload
AllWebMenus WordPress Menu Plugin <= 1.1.3 - Remote File Inclusion
AllWebMenus WordPress Menu Plugin Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
AllWebMenus WordPress Menu Plugin Attack Surface
WordPress Hooks 11
Scheduled Events 1
Maintenance & Trust
AllWebMenus WordPress Menu Plugin Maintenance & Trust
Maintenance Signals
Community Trust
AllWebMenus WordPress Menu Plugin Alternatives
AllWebMenus WordPress Menu Plugin Developer Profile
1 plugin · 20 total installs
How We Detect AllWebMenus WordPress Menu Plugin
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/allwebmenus-wordpress-menu-plugin/widgetClass.php/wp-content/plugins/allwebmenus-wordpress-menu-plugin/menu_helper.php/wp-content/plugins/allwebmenus-wordpress-menu-plugin/include.php/wp-content/plugins/allwebmenus-wordpress-menu-plugin/script.js/wp-content/plugins/allwebmenus-wordpress-menu-plugin/stylesheet.css/wp-content/plugins/allwebmenus-wordpress-menu-plugin/script.jsallwebmenus-wordpress-menu-plugin/script.js?ver=allwebmenus-wordpress-menu-plugin/stylesheet.css?ver=HTML / DOM Fingerprints
AWM_welcome_titleAWM_welcome_title_infoid="AWM_welcome_title"id="AWM_welcome_title_info"id="awm_upload_anchor"awm_set_pathAWM_total_tabsawm_show_welcome