JinMenu Security & Risk Analysis

wordpress.org/plugins/jin-menu

The Jin Menu adds onclick event in wordpress custom link menu item, so that you can use your javascript/jQuery codes from wordpress menu.

200 active installs v3.2.1 PHP + WP 4.0+ Updated May 19, 2020
javascriptjqueryjquery-code-in-menuonclick-in-wp-menuwp-menu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is JinMenu Safe to Use in 2026?

Generally Safe

Score 85/100

JinMenu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The jin-menu plugin v3.2.1 exhibits a concerning security posture primarily due to a complete lack of output escaping. While the plugin has no documented vulnerabilities and a seemingly small attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events, the lack of output escaping presents a significant risk. This means that any data rendered by the plugin could potentially be exploited to inject malicious scripts, leading to cross-site scripting (XSS) vulnerabilities. Furthermore, the absence of nonce and capability checks, coupled with the lack of taint analysis, leaves the plugin open to potential vulnerabilities that might not be immediately apparent from the static analysis. The plugin's historical record of zero vulnerabilities is positive, but it cannot entirely offset the critical deficiency in output sanitization. A comprehensive review of how data is handled and output is essential to mitigate these risks.

Key Concerns

  • All outputs are unescaped
  • No nonce checks found
  • No capability checks found
  • No taint analysis performed
Vulnerabilities
None known

JinMenu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

JinMenu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped17 total outputs
Attack Surface

JinMenu Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
filternav_menu_css_classjinmenu.php:17
actionwp_enqueue_scriptsjinmenu.php:22
actionadmin_menujinmenu.php:27
actionwp_footerjinmenu.php:32
filterwp_setup_nav_menu_itemjinmenu.php:37
filteradmin_body_classjinmenu.php:42
actioninitjinmenu.php:199
Maintenance & Trust

JinMenu Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMay 19, 2020
PHP min version
Downloads14K

Community Trust

Rating60/100
Number of ratings27
Active installs200
Developer Profile

JinMenu Developer Profile

Rohit Kumar

2 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect JinMenu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
jsommenu-item-jinedit-menu-item-jin
Data Attributes
data-sizedata-show-countonclick
JS Globals
jQuery$
FAQ

Frequently Asked Questions about JinMenu