Conditional Menus Security & Risk Analysis

wordpress.org/plugins/conditional-menus

This plugin enables you to set conditional menus per posts, pages, categories, archive pages, etc.

60K active installs v1.2.7 PHP + WP 4.0+ Updated Feb 17, 2026
adminconditional-tagscontextmenumenu-items
100
A · Safe
CVEs total1
Unpatched0
Last CVEMay 24, 2023
Safety Verdict

Is Conditional Menus Safe to Use in 2026?

Generally Safe

Score 100/100

Conditional Menus has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: May 24, 2023Updated 1mo ago
Risk Assessment

The 'conditional-menus' plugin version 1.2.7 presents a mixed security posture. On the positive side, the plugin demonstrates good practices by utilizing prepared statements for all SQL queries and appears to have no unpatched known vulnerabilities. The static analysis also shows no critical or high-severity taint flows, and all identified entry points (AJAX handlers) have nonce checks, indicating an effort to protect against CSRF attacks.

However, there are notable concerns. A significant portion of output (83%) is not properly escaped, creating a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. While there are no critical taint flows identified, unescaped output is a direct pathway for XSS. Furthermore, the plugin lacks capability checks on its AJAX handlers, meaning any authenticated user, regardless of their role, can potentially trigger these handlers. The vulnerability history shows a past medium severity XSS vulnerability, which aligns with the current code analysis finding of widespread unescaped output. This suggests a recurring pattern of insufficient output sanitization.

In conclusion, while the plugin has strengths in its SQL handling and lack of unpatched CVEs, the prevalent issue of unescaped output represents a significant security weakness. The absence of capability checks on AJAX handlers further exacerbates this risk by lowering the barrier to exploitation for authenticated users. These issues necessitate attention to improve the overall security of the plugin.

Key Concerns

  • High percentage of unescaped output
  • AJAX handlers lack capability checks
Vulnerabilities
1

Conditional Menus Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2023-2654medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Conditional Menus <= 1.2.0 - Reflected Cross-Site Scripting

May 24, 2023 Patched in 1.2.1 (244d)
Code Analysis
Analyzed Mar 16, 2026

Conditional Menus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
19
4 escaped
Nonce Checks
3
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

17% escaped23 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
ajax_create_inner_page (init.php:412)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Conditional Menus Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_themify_cm_get_conditionsinit.php:83
authwp_ajax_themify_cm_create_inner_pageinit.php:84
WordPress Hooks 15
actionplugins_loadedinit.php:40
actionplugins_loadedinit.php:41
actionplugins_loadedinit.php:42
actionwpml_after_startupinit.php:43
filterplugin_row_metainit.php:44
actionload-nav-menus.phpinit.php:82
actionadmin_menuinit.php:85
actionadmin_initinit.php:86
actionwp_delete_nav_menuinit.php:87
filterwp_nav_menu_argsinit.php:89
filtertheme_mod_nav_menu_locationsinit.php:90
filtertheme_mod_nav_menu_locationsinit.php:99
filterpre_wp_nav_menuinit.php:163
actionadmin_enqueue_scriptsinit.php:186
actionadmin_footerinit.php:187
Maintenance & Trust

Conditional Menus Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 17, 2026
PHP min version
Downloads880K

Community Trust

Rating88/100
Number of ratings72
Active installs60K
Developer Profile

Conditional Menus Developer Profile

themifyme

10 plugins · 140K total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
145 days
View full developer profile
Detection Fingerprints

How We Detect Conditional Menus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/conditional-menus/assets/admin.css/wp-content/plugins/conditional-menus/assets/admin.js
Script Paths
/wp-content/plugins/conditional-menus/assets/admin.js
Version Parameters
conditional-menus/assets/admin.css?ver=conditional-menus/assets/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
themify_conditional_menus_wrapper
Data Attributes
data-themify-cm-menu-id
JS Globals
themify_cm_noncethemify_cm_admin_url
FAQ

Frequently Asked Questions about Conditional Menus