
Menu Restrict for Anonymous users Security & Risk Analysis
wordpress.org/plugins/menu-restrict-for-anonymous-usersThis plugin restricted the seleted menu so anonymous user won't access this menu item links directly
Is Menu Restrict for Anonymous users Safe to Use in 2026?
Generally Safe
Score 85/100Menu Restrict for Anonymous users has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
Based on the static analysis and vulnerability history, the "menu-restrict-for-anonymous-users" v1.0 plugin exhibits a generally strong security posture. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with exposed entry points is a significant positive, indicating a limited attack surface. Furthermore, the exclusive use of prepared statements for its SQL queries demonstrates good practice in preventing SQL injection vulnerabilities. The low percentage of improperly escaped outputs (25%) is also a positive sign, though it does highlight a minor area for improvement.
The taint analysis, while limited in the number of flows analyzed, did reveal two flows with unsanitized paths. Although classified as non-critical, these represent potential avenues for path traversal or file inclusion vulnerabilities if not handled with extreme care by the developer. The plugin's vulnerability history is clean, with no recorded CVEs, which suggests a well-maintained codebase over time. However, the lack of any recorded vulnerabilities could also simply mean it hasn't been a target or thoroughly scrutinized in the past.
In conclusion, the plugin demonstrates good security hygiene by minimizing its attack surface and employing safe database practices. The minor concern lies in the unsanitized paths identified in the taint analysis. The absence of any historical vulnerabilities is encouraging but should not be a sole reason for complacency. Overall, the plugin appears to be relatively secure for its version, but the unsanitized path flows warrant careful review and potential remediation.
Key Concerns
- Flows with unsanitized paths
- Output escaping: 25% not properly escaped
Menu Restrict for Anonymous users Security Vulnerabilities
Menu Restrict for Anonymous users Code Analysis
Output Escaping
Data Flow Analysis
Menu Restrict for Anonymous users Attack Surface
WordPress Hooks 3
Maintenance & Trust
Menu Restrict for Anonymous users Maintenance & Trust
Maintenance Signals
Community Trust
Menu Restrict for Anonymous users Alternatives
Anonymous Restricted Content
anonymous-restricted-content
Simple but yet effective plugin to hide selected posts and pages from anonymous users.
PBP Restricted Menu-Widget by role
pbp-restricted-menu-widget-by-role
Display menu or widget items based on if a user is logged in, logged out or both.
Admin Menu Restrictor
admin-menu-restrictor
Restricts the WordPress admin menu for non-admin users, showing only the \"Posts\" menu to simplify the interface and enhance security.
BTN Admin Restrictor
btn-admin-restrictor
Dynamically restrict access to dashboard menus for specific Admin users without changing their roles.
Easy Menu Manager
easy-menu-manager
A simple yet powerful plugin to control menu item visibility based on user roles.
Menu Restrict for Anonymous users Developer Profile
5 plugins · 210 total installs
How We Detect Menu Restrict for Anonymous users
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/menu-restrict-for-anonymous-users/css/vg-menu-restrict.cssvg-menu-restrict-styleHTML / DOM Fingerprints
<!-- Menu Restrict for Anonymous users -->