Wizhi Submenus Security & Risk Analysis

wordpress.org/plugins/wizhi-submenus

Display page`s subpage and taxonomy terms belongs to a post type in sidebar,在侧边栏显示某个页面的子页面列表或隶属于某个文章类型下面的自定义分类项目列表。

10 active installs v3.3.5 PHP + WP 3.7+ Updated Aug 1, 2020
menuswidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Wizhi Submenus Safe to Use in 2026?

Generally Safe

Score 85/100

Wizhi Submenus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The wizhi-submenus v3.3.5 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code signals indicate a commendable adherence to secure coding practices, with no dangerous functions detected, all SQL queries utilizing prepared statements, and no file operations or external HTTP requests. The lack of any recorded vulnerabilities (CVEs) in its history is also a positive indicator of past security diligence.

However, there are a few areas that warrant attention and represent potential concerns. The most significant is the remarkably low percentage of properly escaped output (10%). With 40 total outputs analyzed, this means that 36 outputs are not being properly escaped, which could lead to Cross-Site Scripting (XSS) vulnerabilities if any of the data processed or displayed by these outputs originates from an untrusted source. The complete absence of nonce checks and capability checks, while seemingly justified by the minimal attack surface, could become a weakness if new entry points are introduced in future updates without proper security considerations. In conclusion, while the plugin is currently robust due to its limited attack surface and good SQL practices, the widespread unescaped output is a notable risk that should be addressed to ensure comprehensive security.

Key Concerns

  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Wizhi Submenus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Wizhi Submenus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
36
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

10% escaped40 total outputs
Attack Surface

Wizhi Submenus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwidgets_inittrunk\wizhi-submenus.php:190
actionwidgets_initwizhi-submenus.php:190
Maintenance & Trust

Wizhi Submenus Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedAug 1, 2020
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Wizhi Submenus Developer Profile

Amos Lee(一刀)

8 plugins · 5K total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Wizhi Submenus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
rs-submenu__list
Data Attributes
id="wizhi-submenus-widget-custom-css"
FAQ

Frequently Asked Questions about Wizhi Submenus