GoToMenu – Menu Navigator Security & Risk Analysis

wordpress.org/plugins/gotomenu

A simple and accessible WordPress plugin that allows users to quickly navigate through your site's menus using the F2 keyboard shortcut.

10 active installs v1.0.0 PHP 7.4+ WP 5.0+ Updated Nov 16, 2024
accessibilitykeyboardmenunavigationshortcut
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GoToMenu – Menu Navigator Safe to Use in 2026?

Generally Safe

Score 92/100

GoToMenu – Menu Navigator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "gotomenu" v1.0.0 plugin exhibits a strong security posture based on the provided static analysis. The complete absence of direct attack surface points like AJAX handlers, REST API routes, or shortcodes significantly limits potential entry vectors. The code also demonstrates good secure coding practices with a high percentage of properly escaped output and 100% usage of prepared statements for SQL queries. The presence of a nonce check and a capability check further reinforces its defensive mechanisms against common web attacks.

The taint analysis reveals no flows with unsanitized paths, indicating that data flowing through the plugin is handled in a secure manner, with no critical or high severity issues identified. Furthermore, the plugin has no recorded vulnerability history, including CVEs, which suggests a history of stable and secure development. This lack of past issues, combined with the current code quality, points to a reliable and well-maintained plugin.

In conclusion, "gotomenu" v1.0.0 appears to be a highly secure plugin. Its strengths lie in its minimal attack surface, adherence to secure coding principles, and lack of historical vulnerabilities. There are no identified weaknesses or specific risks in the provided data that would warrant significant deductions. The plugin's design and implementation, as evidenced by the analysis, are commendable from a security perspective.

Vulnerabilities
None known

GoToMenu – Menu Navigator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GoToMenu – Menu Navigator Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
18 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

95% escaped19 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
gtmsk_options_page (includes\gotomenu-settings.php:59)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

GoToMenu – Menu Navigator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedgotomenu.php:22
actionwp_enqueue_scriptsgotomenu.php:44
actionadmin_enqueue_scriptsgotomenu.php:63
actionadmin_noticesgotomenu.php:235
actionadmin_initincludes\gotomenu-settings.php:20
actionadmin_menuincludes\gotomenu-settings.php:55
Maintenance & Trust

GoToMenu – Menu Navigator Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedNov 16, 2024
PHP min version7.4
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

GoToMenu – Menu Navigator Developer Profile

Santosh Kori

1 plugin · 10 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GoToMenu – Menu Navigator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gotomenu/assets/css/gotomenu.css/wp-content/plugins/gotomenu/assets/js/gotomenu.js
Script Paths
/wp-content/plugins/gotomenu/assets/js/gotomenu.js
Version Parameters
gotomenu.css?ver=gotomenu.js?ver=

HTML / DOM Fingerprints

JS Globals
gotomenuData
FAQ

Frequently Asked Questions about GoToMenu – Menu Navigator