User Links for WP Menus Security & Risk Analysis

wordpress.org/plugins/user-links-for-wp-menus

Adds a metabox to the menu admin page listing users so they can be more easily added as custom links to the WordPress Custom Menus

10 active installs v0.2 PHP + WP 3.5+ Updated Unknown
authorsmenususers
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is User Links for WP Menus Safe to Use in 2026?

Generally Safe

Score 100/100

User Links for WP Menus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'user-links-for-wp-menus' plugin, in version 0.2, exhibits a mixed security posture. On the positive side, the static analysis reveals no direct entry points like AJAX handlers, REST API routes, shortcodes, or cron events that are exposed. Furthermore, there are no identified dangerous functions, file operations, external HTTP requests, or bundled libraries, which reduces the potential attack surface. The single SQL query observed is commendably using prepared statements, a strong security practice.

However, significant concerns arise from the output escaping. With 7 total outputs and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is displayed by the plugin is likely vulnerable to injection. The complete absence of nonce checks and capability checks, especially given the potential for user interaction even without explicit entry points, is also a significant weakness. The lack of any recorded vulnerability history suggests either a history of good security or a lack of scrutiny, but the current code analysis points to a clear and present danger with unescaped output.

In conclusion, while the plugin avoids many common pitfalls by having a limited attack surface and using prepared statements for its SQL query, the critical flaw in output escaping makes it highly susceptible to XSS attacks. The absence of authorization checks further exacerbates this risk. The vulnerability history being clear is a positive sign, but it does not mitigate the severe issues identified in the current code analysis.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

User Links for WP Menus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

User Links for WP Menus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped7 total outputs
Attack Surface

User Links for WP Menus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_inituser-links-for-wp-menus.php:58
Maintenance & Trust

User Links for WP Menus Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

User Links for WP Menus Developer Profile

Jon Brown

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect User Links for WP Menus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
userlinks-menu-metaboxuserlinks-checklist
Data Attributes
id="userlinks-menu-metabox"id="tabs-panel-users"id="userlinks-checklist"class="menu-item-checkbox"name="menu-item[-.*][menu-item-object-id]"class="menu-item-type"+6 more
FAQ

Frequently Asked Questions about User Links for WP Menus