AMP Sidebar Hamburger Menu Security & Risk Analysis

wordpress.org/plugins/amp-sidebar-hamburger-menu

If you're using AMP in transitional or standard mode check the FAQ's below, or follow the instructions in the settings tab after installing.

100 active installs v1.2.0 PHP + WP 4.0+ Updated Nov 22, 2020
amp-navigationamp-sidebarnavbarnavigation-menu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is AMP Sidebar Hamburger Menu Safe to Use in 2026?

Generally Safe

Score 85/100

AMP Sidebar Hamburger Menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "amp-sidebar-hamburger-menu" v1.2.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, SQL injection risks (all queries use prepared statements), file operations, and external HTTP requests is commendable. The high percentage of properly escaped output is also a positive indicator, reducing the risk of cross-site scripting (XSS) vulnerabilities. Furthermore, the plugin has no known historical vulnerabilities, suggesting a history of secure development.

However, there are a few areas of concern. The plugin relies entirely on capability checks for its entry points (shortcodes). While this is a form of authorization, the lack of explicit nonce checks on these shortcodes could theoretically open the door to CSRF attacks if the shortcodes perform sensitive actions. The analysis also reveals a complete absence of taint analysis, meaning that potential vulnerabilities involving unsanitized user input that could lead to critical or high-severity issues may have been missed. The lack of nonce checks, even if not immediately leading to exploitable issues in this specific version, represents a deviation from best practices for shortcodes that could potentially modify data.

In conclusion, the plugin is in good standing due to its lack of known vulnerabilities and its secure handling of common attack vectors like SQL injection. The significant percentage of escaped output and absence of dangerous functions contribute to a strong baseline. The primary weakness lies in the potential for CSRF if shortcodes handle sensitive operations without nonce protection, and the unknown risk from unsanitized user input due to the absence of taint analysis. Despite these points, the overall security is good.

Key Concerns

  • No nonce checks on shortcodes
  • No taint analysis performed
  • Low percentage of properly escaped output (84%)
Vulnerabilities
None known

AMP Sidebar Hamburger Menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

AMP Sidebar Hamburger Menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
26 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

84% escaped31 total outputs
Attack Surface

AMP Sidebar Hamburger Menu Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[jz-sidebar] amp-wp-sidebar.php:134
[jz-navbarattribute] amp-wp-sidebar.php:148
WordPress Hooks 13
actionadmin_menuamp-wp-sidebar.php:17
actionadmin_initamp-wp-sidebar.php:41
actionadmin_enqueue_scriptsamp-wp-sidebar.php:52
actionwp_headamp-wp-sidebar.php:61
actionwp_enqueue_scriptsamp-wp-sidebar.php:90
actionwp_body_openamp-wp-sidebar.php:275
actionwp_footeramp-wp-sidebar.php:277
filteramp_post_template_dataamp-wp-sidebar.php:281
actionwp_headamp-wp-sidebar.php:296
filteramp_post_template_fileamp-wp-sidebar.php:318
actionamp_post_template_footeramp-wp-sidebar.php:332
filteramp_post_template_dataamp-wp-sidebar.php:334
actionamp_post_template_cssamp-wp-sidebar.php:349
Maintenance & Trust

AMP Sidebar Hamburger Menu Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedNov 22, 2020
PHP min version
Downloads6K

Community Trust

Rating88/100
Number of ratings5
Active installs100
Developer Profile

AMP Sidebar Hamburger Menu Developer Profile

James Osborne

3 plugins · 120 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AMP Sidebar Hamburger Menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/amp-sidebar-hamburger-menu/style.css
Version Parameters
/wp-content/plugins/amp-sidebar-hamburger-menu/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
jzsidebar_containersidenav-btnaf_sidebarsidenav-closesidebar-parent-containernested-accordion
Data Attributes
on="tap:sidenav.open"on="tap:sidenav.close"
Shortcode Output
<div class="jzsidebar_container"><svg class="sidenav-btn" on="tap:sidenav.open" role="button" tabindex="0" width="30px" height="30px" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30.5 24.5"><line x1="1.25" y1="1.25" x2="29.25" y2="1.25"></line><line x1="1.25" y1="12.25" x2="29.25" y2="12.25"></line>
FAQ

Frequently Asked Questions about AMP Sidebar Hamburger Menu