Menu Helper Security & Risk Analysis

wordpress.org/plugins/menu-helper

Menu Helper can be used in 2 forms: as short code ( as described in section A) or, for more advanced programmatic use, as function which returns an ar …

10 active installs v1.1 PHP + WP 3.5+ Updated May 30, 2013
menumenus-manipulationnavigationsubmenus
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Menu Helper Safe to Use in 2026?

Generally Safe

Score 85/100

Menu Helper has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "menu-helper" plugin v1.1 exhibits a generally strong security posture, particularly concerning its handling of SQL queries and avoidance of external requests or file operations. The static analysis shows all SQL queries utilize prepared statements, which significantly mitigates risks of SQL injection. Furthermore, the absence of known CVEs and a clean vulnerability history suggest a developer who is either diligent about security or has not yet introduced exploitable flaws.

However, there are notable areas for improvement. The most significant concern is the complete lack of output escaping on the two identified outputs. This leaves the plugin vulnerable to Cross-Site Scripting (XSS) attacks, where malicious scripts could be injected and executed in the user's browser. Additionally, the absence of nonce checks and capability checks, while not directly linked to an attack surface in this specific analysis (as no AJAX or REST API endpoints were found unprotected), represents a missed opportunity to build more robust security into the plugin's design, especially if future updates introduce new entry points.

In conclusion, while "menu-helper" v1.1 benefits from secure database interaction and a clear vulnerability history, the unescaped output presents a tangible risk of XSS. Developers should prioritize implementing proper output escaping for all outputs to address this critical security gap.

Key Concerns

  • Outputs are not properly escaped (XSS risk)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Menu Helper Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Menu Helper Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
8 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared8 total queries

Output Escaping

0% escaped2 total outputs
Attack Surface

Menu Helper Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[menu_helper] menu-helper.php:52
[menu-helper] menu-helper.php:112
WordPress Hooks 1
actionadmin_menumenu-helper.php:63
Maintenance & Trust

Menu Helper Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedMay 30, 2013
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Menu Helper Developer Profile

SimonaIlie

4 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Menu Helper

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/menu-helper/css/menu-helper.css
Version Parameters
menu-helper/css/menu-helper.css?ver=

HTML / DOM Fingerprints

CSS Classes
menu-helper-sub-menu-container
Data Attributes
data-menu-helper
JS Globals
menuHelper
Shortcode Output
[menu_helper[/menu_helper]
FAQ

Frequently Asked Questions about Menu Helper