Restore Admin Menu (ru_RU) Security & Risk Analysis

wordpress.org/plugins/restore-admin-menu

Restores the admin menu when updating from 3.1.x or an older install to the latest release from ru.wordpress.org.

10 active installs v0.2 PHP + WP 3.5+ Updated May 5, 2015
adminl10nreleasesru_ruupdate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Restore Admin Menu (ru_RU) Safe to Use in 2026?

Generally Safe

Score 85/100

Restore Admin Menu (ru_RU) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "restore-admin-menu" plugin version 0.2 exhibits a seemingly strong security posture based on the static analysis provided. It reports zero AJAX handlers, REST API routes, shortcodes, or cron events, indicating a very limited attack surface. Furthermore, the code signals show no dangerous functions, all SQL queries utilize prepared statements, and all outputs are properly escaped. The absence of known vulnerabilities in its history is also a positive indicator. However, the analysis also reveals some concerning points. The plugin performs a file operation without clearly defined security checks, and more significantly, it lacks any nonce checks or capability checks, which are fundamental security mechanisms in WordPress for preventing various types of attacks, especially when interacting with administrative functions. The fact that there are no taint analysis results and no identified flows could be a reflection of the plugin's simple functionality or an indication that the analysis might not have covered all potential interaction points if the plugin is indeed intended to modify or interact with admin menus.

While the lack of reported vulnerabilities and the use of prepared statements are commendable, the absence of nonce and capability checks represents a significant weakness. This could leave the plugin susceptible to cross-site request forgery (CSRF) attacks or unauthorized access to its features if any are present that could be triggered without proper authorization. The single file operation also warrants closer scrutiny to ensure it's not an avenue for unauthorized file manipulation or access. The overall security is a mixed bag; it's strong in avoiding common pitfalls like SQL injection and XSS but weak in essential WordPress security practices that protect against session hijacking and unauthorized actions.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • File operation without clear security checks
Vulnerabilities
None known

Restore Admin Menu (ru_RU) Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Restore Admin Menu (ru_RU) Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0
Attack Surface

Restore Admin Menu (ru_RU) Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_initrestore-admin-menu.php:30
Maintenance & Trust

Restore Admin Menu (ru_RU) Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedMay 5, 2015
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Restore Admin Menu (ru_RU) Developer Profile

Sergey Biryukov

23 plugins · 313K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Restore Admin Menu (ru_RU)

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Restore Admin Menu (ru_RU)