Network Menu Copier Security & Risk Analysis

wordpress.org/plugins/network-copier

This plugin allows you to bulk copy your menus between sites on your network which are using the same theme.

10 active installs v1.2.2 PHP + WP 3.6+ Updated Unknown
copiercopymenumultisitenetwork
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Network Menu Copier Safe to Use in 2026?

Generally Safe

Score 100/100

Network Menu Copier has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "network-copier" v1.2.2 plugin exhibits a strong security posture in several key areas. The static analysis reveals no identifiable attack surface, meaning there are no direct entry points like AJAX handlers, REST API routes, shortcodes, or cron events that could be directly exploited without authentication. Furthermore, the absence of dangerous functions and file operations is a positive sign. The plugin also demonstrates good practice by exclusively using prepared statements for SQL queries, eliminating the risk of SQL injection through this vector.

However, a significant concern arises from the complete lack of output escaping. With four identified output points and none properly escaped, this presents a substantial risk for cross-site scripting (XSS) vulnerabilities. Any data displayed by the plugin that originates from an untrusted source could be injected with malicious scripts, impacting users of the site. The absence of nonce checks and capability checks on any potential, albeit currently undiscovered, entry points is also a weakness, as it leaves room for CSRF and privilege escalation vulnerabilities should new entry points be introduced or found.

The vulnerability history is clean, with zero recorded CVEs. This, combined with the absence of critical or high-severity taint flows, suggests a generally well-maintained codebase historically. However, the current static analysis findings, particularly the unescaped output, indicate potential for new vulnerabilities to emerge. The plugin's strengths lie in its lack of direct attack vectors and secure SQL handling, but its weakness in output sanitization requires immediate attention.

Key Concerns

  • No output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Network Menu Copier Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Network Menu Copier Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

jQuery

Output Escaping

0% escaped4 total outputs
Attack Surface

Network Menu Copier Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Network Menu Copier Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

Network Menu Copier Developer Profile

Samer Bechara

8 plugins · 260 total installs

83
trust score
Avg Security Score
84/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Network Menu Copier

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/network-copier/lib/internal/NMC_Fetcher.php/wp-content/plugins/network-copier/lib/internal/NMC_Parser.php/wp-content/plugins/network-copier/lib/NetworkMenuCopier.php/wp-content/plugins/network-copier/lib/NetworkMenuWalker.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Network Menu Copier