Menu Humility Security & Risk Analysis

wordpress.org/plugins/menu-humility

Don't you hate it when plugins add top level menus between "Dashboard" and "Posts"? This shoves those to the end.

300 active installs v0.3.1 PHP + WP 3.1+ Updated Apr 18, 2018
adminannoyancemenusreorder
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Menu Humility Safe to Use in 2026?

Generally Safe

Score 85/100

Menu Humility has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "menu-humility" plugin v0.3.1 exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, or direct taint flows is highly commendable. Furthermore, the complete lack of known CVEs, both historically and currently, suggests a well-maintained and secure codebase over time. The plugin also demonstrates good security practices by not implementing AJAX handlers, REST API routes, shortcodes, or cron events which, in this case, simplifies the attack surface to zero. This indicates a plugin that likely focuses on a specific, limited functionality that doesn't require complex interaction points.

While the static analysis reveals no immediate code-level vulnerabilities, the complete absence of nonce checks and capability checks across all potential entry points (even though there are zero identified) represents a potential weakness. If functionality were to be added that did introduce entry points, the current lack of these fundamental security mechanisms would expose the plugin to significant risks, such as Cross-Site Request Forgery (CSRF) or privilege escalation. However, given the current state of zero entry points, this is a theoretical concern rather than an immediate threat. The plugin's strengths lie in its clean codebase and lack of historical vulnerabilities, but the absence of robust authentication checks on any potential future entry points is a notable area for improvement should the plugin evolve.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Menu Humility Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Menu Humility Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Menu Humility Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filtercustom_menu_ordermenu-humility.php:17
filtermenu_ordermenu-humility.php:19
Maintenance & Trust

Menu Humility Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedApr 18, 2018
PHP min version
Downloads9K

Community Trust

Rating100/100
Number of ratings19
Active installs300
Developer Profile

Menu Humility Developer Profile

Mark Jaquith

29 plugins · 176K total installs

69
trust score
Avg Security Score
86/100
Avg Patch Time
3337 days
View full developer profile
Detection Fingerprints

How We Detect Menu Humility

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Menu Humility