Menu Override Security & Risk Analysis

wordpress.org/plugins/menu-override

Override the menu in use on a page level when your template only supports one.

90 active installs v0.4.1 PHP + WP 3.5.1+ Updated Apr 17, 2014
custom-menucustom-navigationmenu-override
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Menu Override Safe to Use in 2026?

Generally Safe

Score 85/100

Menu Override has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'menu-override' plugin version 0.4.1 presents a generally positive security posture based on the provided static analysis. The plugin demonstrates good security practices by having no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero-member attack surface that is entirely protected. Furthermore, the code signals indicate a lack of dangerous functions, raw SQL queries, file operations, and external HTTP requests, all of which are excellent indicators of secure coding. The presence of a nonce check and a capability check also adds a layer of defense.

However, a significant concern arises from the output escaping. With 6 total outputs and only 33% properly escaped, there is a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. This means that user-supplied data, if processed and displayed without proper sanitization, could be exploited to inject malicious scripts into web pages. The absence of any identified taint flows or known historical vulnerabilities is a positive sign, suggesting the plugin has not been a target of past exploits or a source of severe security flaws. Despite the strong foundation in preventing common attack vectors, the unescaped output is a critical weakness that needs immediate attention.

In conclusion, while 'menu-override' v0.4.1 exhibits commendable practices in minimizing its attack surface and avoiding risky code patterns, the significantly low rate of proper output escaping poses a notable security risk. The lack of historical vulnerabilities is encouraging, but it doesn't negate the immediate threat posed by the XSS potential. Addressing the output escaping is paramount to improving the plugin's overall security.

Key Concerns

  • Low rate of proper output escaping
Vulnerabilities
None known

Menu Override Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Menu Override Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
2 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped6 total outputs
Attack Surface

Menu Override Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadd_meta_boxesMenuOverride.php:28
actionsave_postMenuOverride.php:29
filterwp_nav_menu_argsMenuOverride.php:30
Maintenance & Trust

Menu Override Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedApr 17, 2014
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings9
Active installs90
Developer Profile

Menu Override Developer Profile

Phillip Shipley

2 plugins · 100 total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
4075 days
View full developer profile
Detection Fingerprints

How We Detect Menu Override

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
menuOverrideSelectionmo_menu_location_
FAQ

Frequently Asked Questions about Menu Override