
Menu Item Duplicator Security & Risk Analysis
wordpress.org/plugins/menu-item-duplicatorAllow you to duplicate menu items and their sub-elements in Appearance > Menus
Is Menu Item Duplicator Safe to Use in 2026?
Generally Safe
Score 92/100Menu Item Duplicator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "menu-item-duplicator" v1.0.2 plugin exhibits an exceptionally strong security posture based on the provided static analysis and vulnerability history. The absence of any identified entry points, including AJAX handlers, REST API routes, shortcodes, or cron events, significantly reduces its attack surface. Furthermore, the code signals are overwhelmingly positive, with no dangerous functions, all SQL queries using prepared statements, and all output being properly escaped. The lack of file operations, external HTTP requests, and crucially, the absence of nonce and capability checks, while a concern in principle for entry points, is mitigated here by the fact that there are no observable entry points to exploit. The clean taint analysis with zero unsanitized paths reinforces this positive assessment.
The vulnerability history is equally impressive, showing zero known CVEs of any severity. This lack of historical vulnerabilities suggests either a highly secure development process, minimal exposure, or a combination of both. The absence of recent vulnerabilities further solidifies this perception of a well-maintained and secure plugin. However, the complete absence of capability checks across all potential (though currently non-existent) entry points represents a theoretical weakness that could become a concern if the plugin were to evolve and introduce new ways for users to interact with it without proper authorization checks.
In conclusion, the "menu-item-duplicator" v1.0.2 plugin currently presents a very low security risk. Its design has effectively minimized the attack surface, and the code itself appears to follow secure coding practices. The lack of historical vulnerabilities is a strong indicator of its stability. The primary, albeit theoretical, concern lies in the complete lack of capability checks, which could become a point of failure if the plugin's functionality expands without addressing this.
Key Concerns
- Missing capability checks on potential entry points
Menu Item Duplicator Security Vulnerabilities
Menu Item Duplicator Release Timeline
Menu Item Duplicator Code Analysis
Menu Item Duplicator Attack Surface
WordPress Hooks 2
Maintenance & Trust
Menu Item Duplicator Maintenance & Trust
Maintenance Signals
Community Trust
Menu Item Duplicator Alternatives
Advance Nav Menu Manager
advance-nav-menu-manager
Advance Nav Menu Manager lets WordPress admins move, copy, duplicate, or disable menu items with advanced controls directly in the admin panel.
CC Duplicate Menu
cc-duplicate-menu
Safely duplicate WordPress navigation menus from the menu editor.
Max Mega Menu
megamenu
An easy to use mega menu plugin. Written the WordPress way.
Duplicate Menu
duplicate-menu
Easily duplicate your WordPress menus with one click.
Menu Icons by ThemeIsle
menu-icons
Spice up your navigation menus with pretty icons, easily.
Menu Item Duplicator Developer Profile
1 plugin · 2K total installs
How We Detect Menu Item Duplicator
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/menu-item-duplicator/dist/menu-item-duplicator.min.js/wp-content/plugins/menu-item-duplicator/src/menu-item-duplicator.jsdist/menu-item-duplicator.min.jssrc/menu-item-duplicator.jsmenu-item-duplicator/dist/menu-item-duplicator.min.js?ver=menu-item-duplicator/src/menu-item-duplicator.js?ver=HTML / DOM Fingerprints
menuItemDuplicator