Custom right click menu Security & Risk Analysis

wordpress.org/plugins/custom-right-click-menu

Custom right click menu plugin enables you to create a context menu instead of blocking right click for copyright and other issues.

10 active installs v1.1.1 PHP + WP 3.0+ Updated Apr 11, 2013
context-menucustom-menumenuright-clickright-click-menu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom right click menu Safe to Use in 2026?

Generally Safe

Score 85/100

Custom right click menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "custom-right-click-menu" plugin, version 1.1.1, exhibits a generally good security posture in terms of its attack surface and known vulnerability history. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential entry points for attackers. Furthermore, the complete lack of recorded CVEs and the use of prepared statements for all SQL queries are strong indicators of responsible development and a proactive approach to security. The plugin also reports no file operations or external HTTP requests, which further reduces the risk of certain attack vectors.

However, the static analysis reveals a critical weakness: 0% of output escaping. With 8 total outputs identified, this means that all user-provided data or dynamic content displayed by the plugin is likely not being properly sanitized before rendering. This opens the door to potential Cross-Site Scripting (XSS) vulnerabilities, where an attacker could inject malicious scripts into the website, impacting users or the site itself. The lack of capability checks and nonce checks also means that any logic executed by the plugin may not have sufficient authorization or integrity checks, although the limited attack surface mitigates the immediate impact of this in the current version.

In conclusion, while the plugin has a clean vulnerability history and avoids common pitfalls like raw SQL and external requests, the complete failure in output escaping represents a significant and immediate risk. Addressing this vulnerability is paramount to improving the plugin's overall security. The limited attack surface and lack of known vulnerabilities are positive attributes, but the XSS risk needs to be prioritized.

Key Concerns

  • 0% of output escaping found
  • 0 capability checks found
  • 0 nonce checks found
Vulnerabilities
None known

Custom right click menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom right click menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped8 total outputs
Attack Surface

Custom right click menu Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initrc.php:47
actionadmin_menurc.php:49
actionwp_enqueue_scriptsrc.php:124
actionwp_headrc.php:206
actionwp_footerrc.php:207
Maintenance & Trust

Custom right click menu Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedApr 11, 2013
PHP min version
Downloads4K

Community Trust

Rating90/100
Number of ratings4
Active installs10
Developer Profile

Custom right click menu Developer Profile

ezhil

2 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom right click menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Custom right click menu