Menu Option Security & Risk Analysis

wordpress.org/plugins/menu-option

Menu Option allows to control which menu items your site’s visitors will see. i.e. Everyone, Logged In Users, Logged Out Users, Logout Link.

200 active installs v1.1 PHP + WP 5.0+ Updated Oct 31, 2024
filter-menulogout-linkmenuredirect-urlshow-hide-menu
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Menu Option Safe to Use in 2026?

Generally Safe

Score 92/100

Menu Option has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "menu-option" v1.1 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the code adheres to good security practices by demonstrating a 100% usage of prepared statements for SQL queries, proper output escaping, and the presence of at least one nonce and capability check. There are no identified dangerous functions, file operations, or external HTTP requests, which further bolsters its security.

The taint analysis reports zero flows with unsanitized paths, indicating no apparent risks of injection vulnerabilities or insecure data handling within the analyzed code. The plugin also has a clean vulnerability history, with no recorded CVEs, which suggests a history of secure development or prompt patching of any past issues. This combination of a small attack surface, adherence to secure coding practices, and a lack of historical vulnerabilities points to a very low-risk plugin.

While the plugin demonstrates excellent security practices and has no identified vulnerabilities, the lack of any entry points in the static analysis could mean either the plugin is purely informational or its functionality is not exposed through common WordPress mechanisms. However, based solely on the provided data, "menu-option" v1.1 appears to be a secure plugin with no immediate security concerns.

Vulnerabilities
None known

Menu Option Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Menu Option Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Menu Option Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_nav_menu_item_custom_fieldsincludes\base.php:10
actionwp_update_nav_menu_itemincludes\base.php:11
filterwp_nav_menu_objectsincludes\base.php:13
filterwp_get_nav_menu_itemsincludes\base.php:14
actionadmin_enqueue_scriptsincludes\init.php:49
Maintenance & Trust

Menu Option Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 31, 2024
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs200
Developer Profile

Menu Option Developer Profile

Tushar Kapdi

4 plugins · 610 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Menu Option

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/menu-option/assets/js/mo-option-js.js
Script Paths
/wp-content/plugins/menu-option/assets/js/mo-option-js.js
Version Parameters
menu-option/assets/js/mo-option-js.js?ver=

HTML / DOM Fingerprints

CSS Classes
mo-option-fieldsmo-optionmo-option-rolesmo-option-redirect
Data Attributes
name="mo-menu-item-option[name='mo-menu-item-option-roles[name="mo-menu-item-option-redirect[id="mo-menu-item-option-id="mo-menu-item-option-roles-id="mo-menu-item-option-redirect"+2 more
JS Globals
MOMO
FAQ

Frequently Asked Questions about Menu Option