Enhanced Menu Editor Security & Risk Analysis

wordpress.org/plugins/enhanced-menu-editor

Adds menu editing options to the built-in WordPress Menus page like copying entire menus, and synchronizing page hierarchies with menu structures.

100 active installs v1.1 PHP + WP 3.2.1+ Updated Jul 15, 2012
bulk-editcopy-menuenhanced-menumenu-syncsitemap
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Enhanced Menu Editor Safe to Use in 2026?

Generally Safe

Score 85/100

Enhanced Menu Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The 'enhanced-menu-editor' plugin version 1.1 demonstrates a generally good security posture based on the provided static analysis. The plugin has a small attack surface consisting of two AJAX handlers, with none found to be unprotected. The absence of dangerous functions, file operations, and external HTTP requests is also a positive indicator. Furthermore, all output appears to be properly escaped, and taint analysis reveals no identified vulnerabilities. The plugin also boasts a clean vulnerability history with no recorded CVEs.

However, a notable area for improvement is the lack of capability checks on its entry points. While nonces are used, relying solely on them without verifying user capabilities leaves potential for privilege escalation or unauthorized actions if an attacker can bypass nonce verification or exploit other WordPress-level vulnerabilities. The presence of SQL queries that are not always prepared also introduces a slight risk of SQL injection, although the 50% rate of prepared statements mitigates this concern somewhat. Overall, the plugin is relatively secure, but the missing capability checks are a significant weakness that should be addressed.

Key Concerns

  • Missing capability checks on entry points
  • SQL queries not always using prepared statements
Vulnerabilities
None known

Enhanced Menu Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Enhanced Menu Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
2 prepared
Unescaped Output
0
0 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

50% prepared4 total queries
Attack Surface

Enhanced Menu Editor Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_emc2eme_copy_menuemc2-enhanced-menu-editor.php:36
authwp_ajax_emc2eme_sync_pagesemc2-enhanced-menu-editor.php:37
WordPress Hooks 3
actionplugins_loadedemc2-enhanced-menu-editor.php:28
actionadmin_print_scripts-nav-menus.phpemc2-enhanced-menu-editor.php:30
actionpre_get_postsemc2-enhanced-menu-editor.php:58
Maintenance & Trust

Enhanced Menu Editor Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedJul 15, 2012
PHP min version
Downloads10K

Community Trust

Rating100/100
Number of ratings4
Active installs100
Developer Profile

Enhanced Menu Editor Developer Profile

MarcusPope

5 plugins · 7K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Enhanced Menu Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/enhanced-menu-editor/admin.js
Script Paths
/wp-content/plugins/enhanced-menu-editor/admin.js

HTML / DOM Fingerprints

HTML Comments
<!-- Enable enhanced menu editing options to the built-in WordPress Menus page like copying entire menus, and synchronizing menus with pages -->
Data Attributes
data-menu-iddata-menu-item-iddata-original-post-iddata-original-post-parentdata-original-menu-orderdata-original-classes+1 more
JS Globals
emc2eme
REST Endpoints
/wp-json/emc2eme/v1/settings
FAQ

Frequently Asked Questions about Enhanced Menu Editor