Menu In Menu Security & Risk Analysis

wordpress.org/plugins/menu-in-menu

Place one Custom Menu inside another Custom Menu

200 active installs v1.0.0 PHP + WP 4.3+ Updated Apr 2, 2016
menu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Menu In Menu Safe to Use in 2026?

Generally Safe

Score 85/100

Menu In Menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "menu-in-menu" plugin version 1.0.0 demonstrates a generally strong security posture in several key areas. The absence of any known CVEs and a clean vulnerability history are significant positives, suggesting a well-maintained and likely secure plugin. Furthermore, the code analysis reveals no dangerous functions, no file operations, and no external HTTP requests, all of which reduce potential attack vectors. The fact that all SQL queries use prepared statements is also excellent practice.

However, there are critical concerns. A complete lack of output escaping on all identified outputs is a major red flag. This means that any data rendered to the user could potentially be exploited through cross-site scripting (XSS) vulnerabilities. The complete absence of nonce and capability checks, even though the attack surface is currently zero, implies a lack of fundamental security protections that could become problematic if the plugin's functionality evolves or new entry points are introduced. While the plugin currently has no entry points, this could change in future versions, leaving it vulnerable if these basic checks aren't implemented.

In conclusion, while the "menu-in-menu" plugin has a good track record and avoids common pitfalls like raw SQL, the critical oversight in output escaping and the complete lack of authorization checks for any potential future entry points present significant risks. The plugin is not recommended for use without immediate remediation of these issues.

Key Concerns

  • All identified outputs are unescaped
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Menu In Menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Menu In Menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Menu In Menu Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedmenu-in-menu.php:20
actionadmin_menumenu-in-menu.php:51
actionadmin_initmenu-in-menu.php:52
actioncurrent_screenmenu-in-menu.php:54
actioninitmenu-in-menu.php:56
filterwp_get_nav_menu_itemsmenu-in-menu.php:156
Maintenance & Trust

Menu In Menu Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedApr 2, 2016
PHP min version
Downloads10K

Community Trust

Rating100/100
Number of ratings4
Active installs200
Developer Profile

Menu In Menu Developer Profile

wizzud

3 plugins · 3K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Menu In Menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/menu-in-menu/menu-in-menu.php
Version Parameters
menu-in-menu/menu-in-menu.php?ver=1.0.0

HTML / DOM Fingerprints

HTML Comments
<!-- v1.1.0 initial release -->
Data Attributes
data-mim-menu-id
Shortcode Output
[menu-in-menu]
FAQ

Frequently Asked Questions about Menu In Menu