Menubar Security & Risk Analysis

wordpress.org/plugins/menubar

Single and multi-level menus for your WordPress site, styled with customizable menu templates.

1K active installs v5.9.4 PHP + WP 6.1+ Updated Dec 14, 2025
menumenubarnavigationsuckerfishsuperfish
99
A · Safe
CVEs total2
Unpatched0
Last CVEJul 4, 2023
Safety Verdict

Is Menubar Safe to Use in 2026?

Generally Safe

Score 99/100

Menubar has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Jul 4, 2023Updated 3mo ago
Risk Assessment

The "menubar" plugin v5.9.4 presents a mixed security posture. While it demonstrates good practices such as using prepared statements for all SQL queries and a low number of external HTTP requests, significant concerns remain. The presence of the `unserialize` function, without explicit taint analysis results, introduces a potential risk of arbitrary object deserialization if not handled with extreme care and input validation. Furthermore, the plugin has a notable vulnerability history, with two medium-severity CVEs, indicating past weaknesses that could resurface if not addressed. The last known vulnerability was relatively recent, suggesting that the plugin may not have a consistently robust security development lifecycle.

Static analysis reveals an attack surface with one unprotected AJAX handler, which is a critical entry point for potential manipulation. The low percentage of properly escaped output (10%) is also a significant concern, raising the likelihood of Cross-Site Scripting (XSS) vulnerabilities. While the plugin has a good number of nonce checks, the absence of capability checks on any entry points, combined with the unprotected AJAX handler and the `unserialize` function, creates a scenario ripe for exploitation, particularly CSRF and XSS as indicated by past CVEs.

In conclusion, despite some positive security attributes like prepared SQL statements, the "menubar" plugin exhibits several high-risk indicators. The unprotected AJAX handler, the presence of `unserialize` without clear validation, the poor output escaping, and the history of medium-severity vulnerabilities, including CSRF and XSS, necessitate a cautious approach. Users should be aware of these potential weaknesses, and developers should prioritize addressing the identified code signals and past vulnerability types to improve the plugin's overall security.

Key Concerns

  • Unprotected AJAX handler found
  • Dangerous function 'unserialize' present
  • Low output escaping percentage (10%)
  • Two medium severity CVEs in history
  • No capability checks on entry points
Vulnerabilities
2

Menubar Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2023-36687medium · 5.4Cross-Site Request Forgery (CSRF)

Menubar <= 5.8.2 - Cross-Site Request Forgery in wpm-admin.php

Jul 4, 2023 Patched in 5.9 (203d)
CVE-2022-1152medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Menubar <= 5.7.2 - Reflected Cross-Site Scripting

Apr 9, 2022 Patched in 5.8 (654d)
Code Analysis
Analyzed Mar 16, 2026

Menubar Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
9 prepared
Unescaped Output
86
10 escaped
Nonce Checks
7
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$new_item = wpm_create_child ($new_parent_id, unserialize(serialize($old_item)));wpm-tree.php:383

SQL Query Safety

100% prepared9 total queries

Output Escaping

10% escaped96 total outputs
Attack Surface
1 unprotected

Menubar Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 1

authwp_ajax_menubarwpm-main.php:263

Shortcodes 1

[menubar] wpm-main.php:187
WordPress Hooks 8
actioninitwpm-main.php:40
actionadmin_noticeswpm-main.php:46
actionadmin_menuwpm-main.php:59
actionwp_headwpm-main.php:82
actionmenubarwpm-main.php:128
actionwp_menubarwpm-main.php:129
actionwidgets_initwpm-main.php:198
actioninitwpm-main.php:284
Maintenance & Trust

Menubar Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 14, 2025
PHP min version
Downloads181K

Community Trust

Rating94/100
Number of ratings15
Active installs1K
Developer Profile

Menubar Developer Profile

Andrea Tarantini

3 plugins · 7K total installs

78
trust score
Avg Security Score
98/100
Avg Patch Time
693 days
View full developer profile
Detection Fingerprints

How We Detect Menubar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/menubar/wpm-admin.php
Version Parameters
menubar/style.css?ver=menubar/wpm-admin.php?ver=menubar/wpm-db.php?ver=menubar/wpm-menu.php?ver=menubar/wpm-tree.php?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- WP Menubar 5.9.4: start CSS --><!-- WP Menubar 5.9.4: end CSS --><!-- WP Menubar 5.9.4: start menu Menubar, template default, CSS --><!-- WP Menubar 5.9.4: end menu Menubar, template default, CSS -->
Data Attributes
data-menu-id
JS Globals
wpm_options
Shortcode Output
[menubar menu=""]
FAQ

Frequently Asked Questions about Menubar