BuddyMenu BuddyLinks Security & Risk Analysis

wordpress.org/plugins/buddymenu-buddylinks

BuddyPress BuddyLinks does three things really well:

60 active installs v2.2.0 PHP + WP 3.0+ Updated Oct 25, 2013
buddypress-menu-shortcodebuddypress-menu-widgetbuddypress-shortcodeslink-shortcodeslinks
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is BuddyMenu BuddyLinks Safe to Use in 2026?

Generally Safe

Score 85/100

BuddyMenu BuddyLinks has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "buddymenu-buddylinks" v2.2.0 plugin presents a mixed security posture. On the positive side, there are no known CVEs, and all SQL queries are properly prepared, indicating good practices in database interaction. The absence of file operations and external HTTP requests further reduces the attack surface in these areas. However, the code analysis reveals significant concerns, most notably the presence of the `create_function` dangerous function, which can lead to code injection if not handled with extreme care. Additionally, a concerning 67% of output escaping is not properly handled, leaving the plugin vulnerable to Cross-Site Scripting (XSS) attacks. The lack of nonce and capability checks on entry points, despite a small attack surface, means that any unauthenticated user could potentially trigger actions or view sensitive information if vulnerabilities existed within the shortcodes.

The vulnerability history is currently clean, which is a positive indicator. However, this does not negate the risks identified in the static code analysis. The combination of a dangerous function and widespread unescaped output, coupled with a lack of robust authorization checks on its limited entry points, suggests a potential for exploitation. While the plugin currently has no known vulnerabilities, the underlying code quality and implementation details present a risk that could be exploited by attackers if not addressed.

Key Concerns

  • Presence of dangerous function `create_function`
  • High percentage of unescaped output
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

BuddyMenu BuddyLinks Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

BuddyMenu BuddyLinks Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
581
283 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function('', 'return register_widget("buddymenu_widget_class");')buddymenu.php:1798

Output Escaping

33% escaped864 total outputs
Attack Surface

BuddyMenu BuddyLinks Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[buddymenu] buddymenu.php:2538
[buddylink] buddymenu.php:2623
WordPress Hooks 2
actionwp_enqueue_scriptsbuddymenu.php:38
actionwidgets_initbuddymenu.php:1798
Maintenance & Trust

BuddyMenu BuddyLinks Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedOct 25, 2013
PHP min version
Downloads14K

Community Trust

Rating96/100
Number of ratings17
Active installs60
Developer Profile

BuddyMenu BuddyLinks Developer Profile

Lee Hodson (VR51)

2 plugins · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect BuddyMenu BuddyLinks

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/buddymenu-buddylinks/buddymenu-style.css
Version Parameters
buddymenu-style.css?ver=20130328

HTML / DOM Fingerprints

CSS Classes
widget_text
FAQ

Frequently Asked Questions about BuddyMenu BuddyLinks