Amathia: Accessible Dropdown Menus Security & Risk Analysis

wordpress.org/plugins/amathia

Amathia makes dropdown menus accessible. It adds a button to each dropdown menu, which can be easily clicked to open the submenu.

30 active installs v1.0.3 PHP 7.0+ WP 4.4+ Updated Jan 10, 2026
a11yaccessibilitydropdown-menusnavigation-menus
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Amathia: Accessible Dropdown Menus Safe to Use in 2026?

Generally Safe

Score 100/100

Amathia: Accessible Dropdown Menus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The 'amathia' v1.0.3 plugin exhibits a strong security posture based on the provided static analysis. The plugin has a remarkably small attack surface, with zero identified entry points through AJAX, REST API, shortcodes, or cron events. Furthermore, the code signals indicate good development practices, including the absence of dangerous functions, 100% usage of prepared statements for SQL queries, and at least one nonce and capability check. The lack of file operations and external HTTP requests also reduces potential vulnerabilities.

However, a significant concern arises from the output escaping. With 65% of outputs properly escaped, there is a 35% chance that sensitive data could be exposed through cross-site scripting (XSS) vulnerabilities. The taint analysis shows zero flows, which is positive, but the limited output escaping means this could change with more complex code or further development.

The vulnerability history is clean, with no recorded CVEs. This, combined with the other positive indicators, suggests that the developers have prioritized security. In conclusion, while the 'amathia' plugin demonstrates a good foundation of security practices and a clean vulnerability history, the unescaped output presents a notable weakness that requires attention to ensure complete protection against potential XSS attacks.

Key Concerns

  • Unescaped output (35%)
Vulnerabilities
None known

Amathia: Accessible Dropdown Menus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Amathia: Accessible Dropdown Menus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
17 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

65% escaped26 total outputs
Attack Surface

Amathia: Accessible Dropdown Menus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menuamathia-admin-settings.php:13
actionadmin_initamathia-admin-settings.php:139
filterplugin_action_linksamathia-admin-settings.php:151
actionwp_footeramathia-css.php:89
filterwp_nav_menu_objectsamathia-nav-menu.php:55
filterwp_nav_menu_itemsamathia-nav-menu.php:87
actionwp_enqueue_scriptsamathia-nav-menu.php:187
Maintenance & Trust

Amathia: Accessible Dropdown Menus Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 10, 2026
PHP min version7.0
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Amathia: Accessible Dropdown Menus Developer Profile

Marcel Pol

18 plugins · 82K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
1119 days
View full developer profile
Detection Fingerprints

How We Detect Amathia: Accessible Dropdown Menus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/amathia/amathia-frontend.js
Script Paths
/wp-content/plugins/amathia/amathia-frontend.js
Version Parameters
amathia-frontend.js?ver=1.0.3

HTML / DOM Fingerprints

CSS Classes
amathia-navigation-toggleamathia-navigation-amathia-css
HTML Comments
Amathia: Accessible Dropdown Menus * https://wordpress.org/plugins/amathia/ You might need this CSS for some t
FAQ

Frequently Asked Questions about Amathia: Accessible Dropdown Menus