AllWebMenus WordPress Menu Plugin Security & Risk Analysis

wordpress.org/plugins/allwebmenus-wordpress-menu-plugin

Requires commercial (paid) software: AllWebMenus PRO (v5.3.926+)

20 active installs v1.1.24 PHP + WP 3.0+ Updated Jan 7, 2019
allwebmenusdhtml-menudrop-down-menujavascript-menuweb-menu
81
B · Generally Safe
CVEs total3
Unpatched0
Last CVEJan 22, 2012
Safety Verdict

Is AllWebMenus WordPress Menu Plugin Safe to Use in 2026?

Mostly Safe

Score 81/100

AllWebMenus WordPress Menu Plugin is generally safe to use though it hasn't been updated recently. 3 past CVEs were resolved. Keep it updated.

3 known CVEsLast CVE: Jan 22, 2012Updated 7yr ago
Risk Assessment

The "allwebmenus-wordpress-menu-plugin" v1.1.24 exhibits a concerning security posture, primarily due to its outdated vulnerability history and significant code-level weaknesses. While the static analysis reports a seemingly small attack surface and a lack of immediate critical taint flows, this is overshadowed by the critical historical vulnerabilities, specifically "Unrestricted Upload of File with Dangerous Type" and "PHP Remote File Inclusion." The fact that these critical vulnerabilities are present, even if currently patched (indicated by 0 unpatched CVEs), suggests a history of severe insecure coding practices within the plugin. The code analysis further reveals a lack of output escaping (only 1% properly escaped) and no capability checks for a cron event, which, when combined with the historical RFI vulnerabilities, presents a substantial risk. The heavy reliance on raw SQL queries without prepared statements is another significant concern, increasing the susceptibility to SQL injection attacks. Despite the absence of reported critical taint flows in the *current* analysis, the plugin's past and ongoing coding deficiencies make it a high-risk component. Users should exercise extreme caution, prioritize updating to a version that has addressed these fundamental issues, and consider replacing the plugin if these issues persist in newer versions.

Key Concerns

  • No capability checks on cron events
  • Severe lack of output escaping
  • 100% of SQL queries use raw statements
  • 3 historical critical CVEs (RFI, Unrestricted Upload)
Vulnerabilities
3

AllWebMenus WordPress Menu Plugin Security Vulnerabilities

CVEs by Year

1 CVE in 2011
2011
2 CVEs in 2012
2012
Patched Has unpatched

Severity Breakdown

Critical
3

3 total CVEs

CVE-2012-1011critical · 9.8Unrestricted Upload of File with Dangerous Type

AllWebMenus WordPress Menu Plugin <= 1.1.8 - Arbitrary File Upload

Jan 22, 2012 Patched in 1.1.9 (4384d)
CVE-2012-1010critical · 9.8Unrestricted Upload of File with Dangerous Type

AllWebMenus WordPress Menu Plugin < 1.1.9 - Arbitrary File Upload

Jan 19, 2012 Patched in 1.1.9 (4387d)
CVE-2011-3981critical · 9.8Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')

AllWebMenus WordPress Menu Plugin <= 1.1.3 - Remote File Inclusion

Sep 19, 2011 Patched in 1.1.4 (4509d)
Code Analysis
Analyzed Mar 16, 2026

AllWebMenus WordPress Menu Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
33
0 prepared
Unescaped Output
177
1 escaped
Nonce Checks
1
Capability Checks
0
File Operations
11
External Requests
1
Bundled Libraries
0

SQL Query Safety

0% prepared33 total queries

Output Escaping

1% escaped178 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<actions> (actions.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

AllWebMenus WordPress Menu Plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actioninitallwebmenus-wordpress-menu.php:48
actionadmin_initallwebmenus-wordpress-menu.php:49
actionadmin_menuallwebmenus-wordpress-menu.php:50
actionwidgets_initallwebmenus-wordpress-menu.php:54
filterwp_nav_menuallwebmenus-wordpress-menu.php:1187
filterwp_nav_menu_argsallwebmenus-wordpress-menu.php:1188
filterupload_mimesinclude.php:536
actionplugins_loadedwp-session-manager-master\wp-session.php:81
actionshutdownwp-session-manager-master\wp-session.php:116
actionwp_session_garbage_collectionwp-session-manager-master\wp-session.php:159
actionwpwp-session-manager-master\wp-session.php:169

Scheduled Events 1

wp_session_garbage_collection
Maintenance & Trust

AllWebMenus WordPress Menu Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedJan 7, 2019
PHP min version
Downloads49K

Community Trust

Rating74/100
Number of ratings12
Active installs20
Developer Profile

AllWebMenus WordPress Menu Plugin Developer Profile

LiknoSoftware

1 plugin · 20 total installs

66
trust score
Avg Security Score
81/100
Avg Patch Time
4427 days
View full developer profile
Detection Fingerprints

How We Detect AllWebMenus WordPress Menu Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/allwebmenus-wordpress-menu-plugin/widgetClass.php/wp-content/plugins/allwebmenus-wordpress-menu-plugin/menu_helper.php/wp-content/plugins/allwebmenus-wordpress-menu-plugin/include.php/wp-content/plugins/allwebmenus-wordpress-menu-plugin/script.js/wp-content/plugins/allwebmenus-wordpress-menu-plugin/stylesheet.css
Script Paths
/wp-content/plugins/allwebmenus-wordpress-menu-plugin/script.js
Version Parameters
allwebmenus-wordpress-menu-plugin/script.js?ver=allwebmenus-wordpress-menu-plugin/stylesheet.css?ver=

HTML / DOM Fingerprints

CSS Classes
AWM_welcome_titleAWM_welcome_title_info
Data Attributes
id="AWM_welcome_title"id="AWM_welcome_title_info"id="awm_upload_anchor"
JS Globals
awm_set_pathAWM_total_tabsawm_show_welcome
FAQ

Frequently Asked Questions about AllWebMenus WordPress Menu Plugin