Current Username on Navigation Label Security & Risk Analysis

wordpress.org/plugins/current-username-on-navigation-lable

This plugin allows you to display current username (Display Name) on wordpress menu navigation label or title attribute.

100 active installs v1.0.0 PHP + WP 3.5+ Updated May 12, 2014
menusnavigation-labeltitle-attributesusername
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Current Username on Navigation Label Safe to Use in 2026?

Generally Safe

Score 85/100

Current Username on Navigation Label has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "current-username-on-navigation-lable" plugin v1.0.0 demonstrates a strong adherence to secure coding practices based on the provided static analysis. There are no detected dangerous functions, all SQL queries utilize prepared statements, and all outputs are properly escaped. Furthermore, the plugin exhibits no file operations or external HTTP requests. The attack surface is minimal, with only one shortcode entry point, and importantly, no unauthenticated entry points were identified. The vulnerability history is clean, with zero recorded CVEs, indicating a likely low risk of exploitation from known vulnerabilities.

Despite the positive findings, a key concern is the complete absence of nonce checks and capability checks. While the static analysis did not identify any direct unauthenticated entry points for these checks to fail on, this omission leaves the plugin vulnerable to potential Cross-Site Request Forgery (CSRF) attacks if its functionality were to be invoked in a way that is not inherently protected by WordPress's core security mechanisms. The lack of taint analysis results is also a minor point of interest; while it might indicate a lack of complex data handling, it could also mean the analysis couldn't fully assess potential data flow issues.

In conclusion, this plugin appears to be well-developed from a security standpoint, with a focus on preventing common vulnerabilities like SQL injection and cross-site scripting. However, the lack of essential security measures like nonce and capability checks represents a significant weakness that, if exploited, could lead to unauthorized actions. The clean vulnerability history is a positive indicator, but it does not negate the inherent risks associated with missing fundamental security controls.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
Vulnerabilities
None known

Current Username on Navigation Label Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Current Username on Navigation Label Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Current Username on Navigation Label Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[current-username] current-username-on-navigation-label.php:16
WordPress Hooks 1
filterwp_nav_menucurrent-username-on-navigation-label.php:11
Maintenance & Trust

Current Username on Navigation Label Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedMay 12, 2014
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings6
Active installs100
Developer Profile

Current Username on Navigation Label Developer Profile

Al-Mamun Talukder

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Current Username on Navigation Label

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[current-username]
FAQ

Frequently Asked Questions about Current Username on Navigation Label