DMG Custom Menu Widget Security & Risk Analysis

wordpress.org/plugins/dmg-custom-menu-widget

Display any Menu in your sidebar or widgetized area. With advanced options to add CSS classes, modify the title & add custom HTML/ Text.

10 active installs v1.0 PHP + WP 3.1+ Updated Aug 25, 2016
csslist-pagesmenumenu-widget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is DMG Custom Menu Widget Safe to Use in 2026?

Generally Safe

Score 85/100

DMG Custom Menu Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "dmg-custom-menu-widget" plugin version 1.0 exhibits a generally strong security posture based on the provided static analysis. The absence of known CVEs and a clean vulnerability history indicates a responsible development approach. The code analysis reveals no dangerous functions, no raw SQL queries, no file operations, and no external HTTP requests, all of which are positive security indicators. The plugin also demonstrates good practices by using prepared statements for any potential database interactions and has at least one capability check, suggesting an awareness of WordPress's permission system.

However, there are areas for improvement. A significant concern is the low percentage of properly escaped output (64%), indicating that up to 36% of output may be vulnerable to cross-site scripting (XSS) attacks. While the attack surface appears minimal with no AJAX handlers, REST API routes, shortcodes, or cron events, the lack of nonce checks on any potential (though not detected) AJAX handlers is a potential weakness. The taint analysis showing zero flows is positive, but it's important to note that this may be due to the limited scope of analysis or the plugin's simplicity. The absence of bundled libraries is also a positive in that it avoids the risk of outdated, vulnerable components.

Overall, the plugin is in a relatively secure state with no critical or high-severity issues apparent in the code analysis or historical data. The primary risk lies in the potential for XSS vulnerabilities due to insufficient output escaping. Continued vigilance and addressing the output escaping is recommended to further harden the plugin's security.

Key Concerns

  • Insufficient output escaping (36%)
  • No nonce checks on potential AJAX handlers
Vulnerabilities
None known

DMG Custom Menu Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

DMG Custom Menu Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
7 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

64% escaped11 total outputs
Attack Surface

DMG Custom Menu Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initdmg-custom-menu-widget.php:51
Maintenance & Trust

DMG Custom Menu Widget Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedAug 25, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

DMG Custom Menu Widget Developer Profile

dancoded

3 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DMG Custom Menu Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dmg-custom-menu-widget/dmg-custom-menu-widget.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about DMG Custom Menu Widget