Menu Restrict for Anonymous users Security & Risk Analysis

wordpress.org/plugins/menu-restrict-for-anonymous-users

This plugin restricted the seleted menu so anonymous user won't access this menu item links directly

0 active installs v1.0 PHP + WP 3.5+ Updated Jul 19, 2017
anonymousmenurestrict
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Menu Restrict for Anonymous users Safe to Use in 2026?

Generally Safe

Score 85/100

Menu Restrict for Anonymous users has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

Based on the static analysis and vulnerability history, the "menu-restrict-for-anonymous-users" v1.0 plugin exhibits a generally strong security posture. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with exposed entry points is a significant positive, indicating a limited attack surface. Furthermore, the exclusive use of prepared statements for its SQL queries demonstrates good practice in preventing SQL injection vulnerabilities. The low percentage of improperly escaped outputs (25%) is also a positive sign, though it does highlight a minor area for improvement.

The taint analysis, while limited in the number of flows analyzed, did reveal two flows with unsanitized paths. Although classified as non-critical, these represent potential avenues for path traversal or file inclusion vulnerabilities if not handled with extreme care by the developer. The plugin's vulnerability history is clean, with no recorded CVEs, which suggests a well-maintained codebase over time. However, the lack of any recorded vulnerabilities could also simply mean it hasn't been a target or thoroughly scrutinized in the past.

In conclusion, the plugin demonstrates good security hygiene by minimizing its attack surface and employing safe database practices. The minor concern lies in the unsanitized paths identified in the taint analysis. The absence of any historical vulnerabilities is encouraging but should not be a sole reason for complacency. Overall, the plugin appears to be relatively secure for its version, but the unsanitized path flows warrant careful review and potential remediation.

Key Concerns

  • Flows with unsanitized paths
  • Output escaping: 25% not properly escaped
Vulnerabilities
None known

Menu Restrict for Anonymous users Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Menu Restrict for Anonymous users Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped8 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
VG_menu_restrict_to_option (menu-restrict.php:127)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Menu Restrict for Anonymous users Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initmenu-restrict.php:51
actionadmin_menumenu-restrict.php:52
actionwp_headmenu-restrict.php:205
Maintenance & Trust

Menu Restrict for Anonymous users Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJul 19, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Menu Restrict for Anonymous users Developer Profile

Venugopal

5 plugins · 210 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Menu Restrict for Anonymous users

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/menu-restrict-for-anonymous-users/css/vg-menu-restrict.css
Version Parameters
vg-menu-restrict-style

HTML / DOM Fingerprints

HTML Comments
<!-- Menu Restrict for Anonymous users -->
FAQ

Frequently Asked Questions about Menu Restrict for Anonymous users