Local Navigation Extended Security & Risk Analysis

wordpress.org/plugins/local-navigation-extended

This simple widget uses the wp_list_pages() to output a local navigation menu.

10 active installs v0.1 PHP + WP 3.0+ Updated Apr 17, 2012
local-navigation-widgetmenuwp_list_pages
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Local Navigation Extended Safe to Use in 2026?

Generally Safe

Score 85/100

Local Navigation Extended has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "local-navigation-extended" plugin version 0.1 exhibits a very limited attack surface, with no detected AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the static analysis found no dangerous functions, file operations, or external HTTP requests, and all SQL queries utilize prepared statements. This indicates a strong adherence to secure coding practices in these areas.

However, a significant concern arises from the complete absence of output escaping for all detected outputs. This means that any data rendered by the plugin could potentially be vulnerable to cross-site scripting (XSS) attacks if it originates from untrusted user input. The lack of nonce and capability checks on entry points (though there are none detected) would also be a major concern if such entry points existed. The plugin's vulnerability history is clean, which is a positive sign, but given the present code analysis findings, it's possible that vulnerabilities have simply not been discovered or reported yet.

In conclusion, while the plugin demonstrates a commendable effort in minimizing its attack surface and securing its data interactions, the critical oversight in output escaping presents a tangible risk. The absence of past vulnerabilities should not overshadow this current, identifiable security flaw. Addressing the output escaping issue should be the immediate priority.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Local Navigation Extended Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Local Navigation Extended Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Local Navigation Extended Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionplugins_loadedlne-init.php:33
Maintenance & Trust

Local Navigation Extended Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedApr 17, 2012
PHP min version
Downloads2K

Community Trust

Rating80/100
Number of ratings1
Active installs10
Developer Profile

Local Navigation Extended Developer Profile

chriscarvache

3 plugins · 120 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Local Navigation Extended

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/local-navigation-extended/css/local-navigation-extended.css/wp-content/plugins/local-navigation-extended/js/local-navigation-extended.js
Script Paths
/wp-content/plugins/local-navigation-extended/js/local-navigation-extended.js
Version Parameters
local-navigation-extended/css/local-navigation-extended.css?ver=local-navigation-extended/js/local-navigation-extended.js?ver=

HTML / DOM Fingerprints

CSS Classes
local-navigation-extended-widget
JS Globals
local_navigation_extended_params
FAQ

Frequently Asked Questions about Local Navigation Extended