Custom Menu Security & Risk Analysis

wordpress.org/plugins/custom-menu

This plugin allows you to display a custom menu that you've created in your theme's "Menus" section in a post or page.

400 active installs v1.8 PHP + WP 2.0.2+ Updated Dec 20, 2011
custom-menu
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEAug 17, 2025
Safety Verdict

Is Custom Menu Safe to Use in 2026?

Use With Caution

Score 63/100

Custom Menu has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Aug 17, 2025Updated 14yr ago
Risk Assessment

The 'custom-menu' plugin v1.8 exhibits a mixed security posture. On the positive side, it demonstrates good practices by using prepared statements for all SQL queries and has a relatively small attack surface with no unprotected entry points found in the static analysis. It also performs capability checks and handles file operations, which are common necessities for plugins. However, significant concerns arise from the complete lack of output escaping, meaning all four identified output points are vulnerable to Cross-Site Scripting (XSS) attacks. Additionally, the absence of nonce checks on any entry points is a critical oversight, potentially allowing for Cross-Site Request Forgery (CSRF) if other vulnerabilities are present or if the plugin's functionality is sensitive. The vulnerability history, with one currently unpatched medium severity CVE for XSS discovered in the near future, reinforces the output escaping issue and suggests a pattern of input sanitization deficiencies.

Key Concerns

  • Unpatched CVE
  • No output escaping
  • No nonce checks
Vulnerabilities
1

Custom Menu Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-49436medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Custom Menu <= 1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting

Aug 17, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Custom Menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
1
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Custom Menu Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[menu] custom-menu.php:58
WordPress Hooks 9
actionadmin_noticesclass-custom-menu-admin.php:39
filterplugin_action_linksclass-custom-menu-admin.php:42
actionadmin_footerclass-custom-menu-admin.php:59
filterplugin_row_metaclass-custom-menu-admin.php:61
actionwp_enqueue_scriptsclass-custom-menu.php:25
actionwp_print_stylesclass-custom-menu.php:26
actioninitcustom-menu.php:39
actionadmin_initcustom-menu.php:48
actionplugins_loadedcustom-menu.php:53
Maintenance & Trust

Custom Menu Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedDec 20, 2011
PHP min version
Downloads29K

Community Trust

Rating0/100
Number of ratings0
Active installs400
Developer Profile

Custom Menu Developer Profile

thiudis

2 plugins · 410 total installs

76
trust score
Avg Security Score
74/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-menu/css/admin.css/wp-content/plugins/custom-menu/js/admin.js
Script Paths
/wp-content/plugins/custom-menu/js/admin.js
Version Parameters
custom-menu/css/admin.css?ver=custom-menu/js/admin.js?ver=

HTML / DOM Fingerprints

Shortcode Output
[menu name=[menu name=[menu name=
FAQ

Frequently Asked Questions about Custom Menu