Menu Duplicator Security & Risk Analysis

wordpress.org/plugins/menu-duplicator

Effortlessly clone your WordPress menus with Menu Duplicator, the user-friendly plugin designed to streamline your website management process in just …

10K active installs v0.8 PHP + WP 4.0+ Updated Jan 12, 2026
menunavnavigation
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Menu Duplicator Safe to Use in 2026?

Generally Safe

Score 100/100

Menu Duplicator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The 'menu-duplicator' plugin version 0.8 exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the code demonstrates good practices by using prepared statements for all SQL queries, performing robust output escaping with only a small percentage unescaped, and including both nonce and capability checks. The lack of dangerous functions, file operations, and external HTTP requests further reinforces its secure design.

However, the analysis indicates zero taint flows analyzed, which is unusual for a plugin that likely interacts with user input or data that could be manipulated. This doesn't necessarily mean there are no taint flows, but rather that the analysis may not have been comprehensive enough to detect them. The limited scope of the taint analysis is a minor concern.

The plugin has no recorded vulnerability history, including CVEs. This is a positive indicator of its past security and development diligence. While the lack of past vulnerabilities is reassuring, it's important to note that this only reflects past performance. The absence of analyzed taint flows could mask potential issues that might lead to future vulnerabilities.

Key Concerns

  • Zero taint flows analyzed
  • Minor output escaping concerns
Vulnerabilities
None known

Menu Duplicator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Menu Duplicator Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
15 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

94% escaped16 total outputs
Attack Surface

Menu Duplicator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menumenu-duplicator.php:53
actioninitmenu-duplicator.php:86
actionadmin_headmenu-duplicator.php:110
actioncurrent_screenmenu-duplicator.php:113
actionadmin_noticesmenu-duplicator.php:269
Maintenance & Trust

Menu Duplicator Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 12, 2026
PHP min version
Downloads88K

Community Trust

Rating94/100
Number of ratings13
Active installs10K
Developer Profile

Menu Duplicator Developer Profile

Jeremy Ross

2 plugins · 10K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Menu Duplicator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/menu-duplicator/scripts/menu-duplicator.js
Script Paths
/wp-content/plugins/menu-duplicator/scripts/menu-duplicator.js
Version Parameters
menu-duplicator.js?ver=1.0

HTML / DOM Fingerprints

Data Attributes
id="menu-to-duplicate"name="menu-to-duplicate"id="new-menu-name"name="new-menu-name"name="type"value="menu-duplicator"+1 more
JS Globals
MD_TOOLS_PAGE
FAQ

Frequently Asked Questions about Menu Duplicator