Duplicate Menu Security & Risk Analysis

wordpress.org/plugins/duplicate-menu

Easily duplicate your WordPress menus with one click.

100K active installs v0.2.3 PHP + WP 3.4.2+ Updated Dec 30, 2025
clonecopyduplicatemenu
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Duplicate Menu Safe to Use in 2026?

Generally Safe

Score 100/100

Duplicate Menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "duplicate-menu" plugin version 0.2.3 exhibits an excellent security posture based on the provided static analysis. The plugin has zero identified AJAX handlers, REST API routes, shortcodes, or cron events, which drastically limits its attack surface. Furthermore, the code demonstrates strong security practices with no dangerous functions, 100% prepared SQL statements, and 100% properly escaped output. The presence of a nonce check indicates a good understanding of securing entry points, even though there are no direct entry points identified that would typically require one. The vulnerability history is also clean, with zero known CVEs, suggesting a well-maintained and secure codebase over time.

The static analysis and taint analysis show no critical or high severity issues, nor any unsanitized paths. This indicates that user input, if processed, is handled securely and does not pose a risk of injection or other common vulnerabilities. The absence of file operations and external HTTP requests further reduces potential attack vectors. While there are no capability checks explicitly listed for the identified entry points, the overall lack of exploitable entry points makes this less of a concern in this specific case. The plugin appears to be robust and securely developed, with no immediate or historical security concerns that would warrant significant risk.

Vulnerabilities
None known

Duplicate Menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Duplicate Menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
10 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped10 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
options_screen (duplicate-menu.php:115)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Duplicate Menu Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menuduplicate-menu.php:39
Maintenance & Trust

Duplicate Menu Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 30, 2025
PHP min version
Downloads572K

Community Trust

Rating92/100
Number of ratings104
Active installs100K
Developer Profile

Duplicate Menu Developer Profile

Jon Christopher

11 plugins · 110K total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Duplicate Menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Duplicate Menu