Wield Menu Security & Risk Analysis

wordpress.org/plugins/wield-menu

Make long and complex Navigation Menus wieldable

20 active installs v1.2.1 PHP + WP 4.5+ Updated Jul 12, 2021
menusnavigation-menu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Wield Menu Safe to Use in 2026?

Generally Safe

Score 85/100

Wield Menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The 'wield-menu' v1.2.1 plugin demonstrates a strong security posture based on the provided static analysis. The absence of any detected attack surface entries like AJAX handlers, REST API routes, or shortcodes, combined with 100% usage of prepared statements for SQL queries and proper output escaping, indicates diligent development practices. The lack of critical or high-severity taint flows further reinforces this assessment, suggesting that user-supplied data is not being processed in a way that would lead to common vulnerabilities.

However, the analysis does highlight areas for potential concern. The presence of two file operations without any explicit indication of nonce or capability checks raises a question about the security of these operations. If these file operations are triggered by user input, they could potentially be exploited. The complete absence of nonce and capability checks across all analyzed components is also a notable weakness, as these are fundamental WordPress security mechanisms for protecting against CSRF attacks and ensuring proper authorization.

Given the plugin's vulnerability history, which shows zero recorded CVEs, it suggests a history of stable security. This, coupled with the strong code signals in areas like SQL and output, is a positive indicator. However, the lack of any recorded vulnerabilities might also be due to limited historical testing or a small user base. The absence of any reported vulnerabilities over time is a good sign, but the lack of explicit authorization checks in the code remains a point of caution.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • File operations without clear auth checks
Vulnerabilities
None known

Wield Menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Wield Menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0
Attack Surface

Wield Menu Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_enqueue_scriptswield-menu.php:14
Maintenance & Trust

Wield Menu Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedJul 12, 2021
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings4
Active installs20
Developer Profile

Wield Menu Developer Profile

alpipego

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Wield Menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wield-menu/css/wield-menu.css/wp-content/plugins/wield-menu/css/wield-menu.min.css/wp-content/plugins/wield-menu/js/wield-menu.js/wp-content/plugins/wield-menu/js/wield-menu.min.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Wield Menu