Custom Page Menus Security & Risk Analysis

wordpress.org/plugins/custom-page-menus

Custom Page Menus plugin allows custom menus to be defined on a per-page basis.

90 active installs v1.0 PHP + WP 3.0+ Updated Apr 27, 2011
custom-menucustom-menusmenu-widgetpage-menuunique-menu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Page Menus Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Page Menus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "custom-page-menus" plugin v1.0 exhibits a generally concerning security posture despite an absence of known historical vulnerabilities and a seemingly small attack surface. While the static analysis reports zero AJAX handlers, REST API routes, shortcodes, or cron events, indicating a limited direct entry point for attackers, the code itself reveals significant weaknesses. The presence of the `create_function` dangerous function is a red flag, as it's a known source of potential code injection vulnerabilities if not handled with extreme care and input validation. Furthermore, the critically low 6% of properly escaped outputs across 32 output points suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the user interface. The taint analysis showing two unsanitized paths, even without critical or high severity, points to potential data leakage or manipulation risks. The complete lack of nonce and capability checks on all identified entry points (though zero in number) is also a notable weakness. The plugin's vulnerability history being completely clear is a positive sign, but it does not negate the inherent risks identified in the code analysis, which are substantial.

Key Concerns

  • Presence of dangerous function create_function
  • Low percentage of properly escaped output
  • Unsanitized paths found in taint analysis
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

Custom Page Menus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Page Menus Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
30
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("CustomPagesWidget");'));widget-class.php:100

Output Escaping

6% escaped32 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
create_custom_page_menu (index.php:25)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Custom Page Menus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionsubmitpage_boxindex.php:16
actionwidgets_initwidget-class.php:100
Maintenance & Trust

Custom Page Menus Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedApr 27, 2011
PHP min version
Downloads14K

Community Trust

Rating60/100
Number of ratings2
Active installs90
Developer Profile

Custom Page Menus Developer Profile

ray.viljoen

6 plugins · 400 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Page Menus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
custom-pages-divhowto
HTML Comments
Ommitted by WP ----- DO NOT REMOVE !!
Data Attributes
name="custom-page-menu-title"name="add"name="remove"
FAQ

Frequently Asked Questions about Custom Page Menus