QuadMenu – Divi Mega Menu Security & Risk Analysis

wordpress.org/plugins/quadmenu-divi

Create a Mega Menu in Divi.

1K active installs v1.2.0 PHP + WP 4.8+ Updated Mar 15, 2021
dividivi-megamenudivi-menuquadmenu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is QuadMenu – Divi Mega Menu Safe to Use in 2026?

Generally Safe

Score 85/100

QuadMenu – Divi Mega Menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The static analysis of quadmenu-divi v1.2.0 reveals a generally good security posture with no identified vulnerabilities in the attack surface, dangerous functions, or taint analysis. The plugin demonstrates a commitment to secure coding practices by exclusively using prepared statements for all SQL queries and implementing capability checks for its outputs. The absence of recorded CVEs and a history of vulnerabilities further reinforces this positive assessment, suggesting a well-maintained and secure codebase.

However, a significant concern arises from the complete lack of output escaping. With two identified output points and 0% properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. While the plugin has no identified external HTTP requests, file operations, or specific nonce checks, the unescaped output is a critical oversight that could be exploited by attackers to inject malicious scripts into user interfaces.

In conclusion, quadmenu-divi v1.2.0 exhibits strengths in its limited attack surface and secure database interaction. Nevertheless, the critical lack of output escaping poses a substantial security risk that needs immediate attention. The absence of historical vulnerabilities is a positive sign, but it does not negate the present danger posed by the unescaped outputs.

Key Concerns

  • Output escaping is not implemented
Vulnerabilities
None known

QuadMenu – Divi Mega Menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

QuadMenu – Divi Mega Menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

QuadMenu – Divi Mega Menu Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionadmin_noticesquadmenu-divi.php:27
actioninitquadmenu-divi.php:29
actioninitquadmenu-divi.php:31
filterquadmenu_locate_templatequadmenu-divi.php:33
filterquadmenu_default_optionsquadmenu-divi.php:35
filterquadmenu_default_themesquadmenu-divi.php:37
filterquadmenu_developer_optionsquadmenu-divi.php:39
actionwp_enqueue_scriptsquadmenu-divi.php:103
filterquadmenu_compiler_filesquadmenu-divi.php:105
actionet_header_topquadmenu-divi.php:175
Maintenance & Trust

QuadMenu – Divi Mega Menu Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.0
Last updatedMar 15, 2021
PHP min version
Downloads60K

Community Trust

Rating60/100
Number of ratings6
Active installs1K
Developer Profile

QuadMenu – Divi Mega Menu Developer Profile

QuadMenu

7 plugins · 2K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect QuadMenu – Divi Mega Menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/quadmenu-divi/assets/quadmenu-divi.less
Version Parameters
quadmenu-divi/quadmenu-divi.css?ver=

HTML / DOM Fingerprints

CSS Classes
mobile_navmobile_menu_baret_mobile_menu
Data Attributes
data-layoutdata-theme
JS Globals
QuadMenu_Divi
Shortcode Output
<div class="mobile_nav closed"><span class="select_page">Select Page</span><span class="mobile_menu_bar mobile_menu_bar_toggle"></span><div class="et_mobile_menu">
FAQ

Frequently Asked Questions about QuadMenu – Divi Mega Menu