Page Specific Menu Items Security & Risk Analysis

wordpress.org/plugins/page-specific-menu-items

Allows user to select menu items page wise.

2K active installs v1.6.5 PHP + WP 3.5+ Updated Nov 28, 2017
menumenu-itemspage-specific-menu-itemspage-wise-menupost-specific-menu-items
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Page Specific Menu Items Safe to Use in 2026?

Generally Safe

Score 85/100

Page Specific Menu Items has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The plugin 'page-specific-menu-items' v1.6.5 exhibits a generally strong security posture based on the static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the attack surface. Furthermore, the code appears to adhere to good practices regarding SQL queries, exclusively using prepared statements, and includes a healthy number of nonce and capability checks. The vulnerability history is also clean, with no known CVEs, indicating a potentially stable and well-maintained codebase.

However, a significant concern arises from the complete lack of output escaping. With 20 identified output points and 0% properly escaped, this presents a considerable risk of Cross-Site Scripting (XSS) vulnerabilities. Any data that is displayed to users, whether directly from user input or indirectly through other means, is not being properly sanitized, opening the door for malicious scripts to be injected and executed in the user's browser. While the taint analysis did not reveal any issues, this is likely due to the limited analysis scope (0 flows analyzed) and the fact that XSS vulnerabilities often manifest in the output phase rather than through complex data flows.

In conclusion, while the plugin's design minimizes direct entry points and demonstrates good backend practices, the severe lack of output escaping is a critical weakness. This single oversight overshadows the otherwise positive aspects of the code and requires immediate attention to prevent potential XSS attacks. The clean vulnerability history is a positive indicator, but it does not mitigate the immediate risk posed by unescaped output.

Key Concerns

  • Unescaped output in all identified instances
Vulnerabilities
None known

Page Specific Menu Items Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Page Specific Menu Items Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
0 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped20 total outputs
Attack Surface

Page Specific Menu Items Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actionadmin_initpage-specific-menu-items.php:39
actionadmin_initpage-specific-menu-items.php:40
actionadd_meta_boxespage-specific-menu-items.php:41
actionadmin_menupage-specific-menu-items.php:42
actionsave_postpage-specific-menu-items.php:43
actionwp_headpage-specific-menu-items.php:48
filterwp_nav_menu_objectspage-specific-menu-items.php:49
actionadmin_enqueue_scriptspage-specific-menu-items.php:124
actionadmin_inittrunk\page-specific-menu-items.php:39
actionadmin_inittrunk\page-specific-menu-items.php:40
actionadd_meta_boxestrunk\page-specific-menu-items.php:41
actionadmin_menutrunk\page-specific-menu-items.php:42
actionsave_posttrunk\page-specific-menu-items.php:43
actionwp_headtrunk\page-specific-menu-items.php:48
filterwp_nav_menu_objectstrunk\page-specific-menu-items.php:49
actionadmin_enqueue_scriptstrunk\page-specific-menu-items.php:124
Maintenance & Trust

Page Specific Menu Items Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedNov 28, 2017
PHP min version
Downloads107K

Community Trust

Rating92/100
Number of ratings52
Active installs2K
Developer Profile

Page Specific Menu Items Developer Profile

dharmapoudel

2 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Page Specific Menu Items

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/page-specific-menu-items/assets/script.js/wp-content/plugins/page-specific-menu-items/assets/style.css
Script Paths
assets/script.js
Version Parameters
page-specific-menu-items/assets/style.css?ver=page-specific-menu-items/assets/script.js?ver=

HTML / DOM Fingerprints

Data Attributes
id="psmi_menu_items"name="psmi-menu-items"id="psmi_select_menu"name="psmi_defaults[menu_id]"id="psmi_items_viewoptions"name="psmi_defaults[items_defaultview]"
FAQ

Frequently Asked Questions about Page Specific Menu Items