
Admin Menu Cleaner Security & Risk Analysis
wordpress.org/plugins/wp-admin-menu-wizardWp Admin Menu Wizard lets you hide the menu items you do not use very often.
Is Admin Menu Cleaner Safe to Use in 2026?
Generally Safe
Score 85/100Admin Menu Cleaner has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin 'wp-admin-menu-wizard' v1.1.3 exhibits a strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code signals indicate good practices regarding SQL queries (100% prepared statements) and a complete lack of dangerous functions, file operations, or external HTTP requests. The vulnerability history is also spotless, with no known CVEs recorded.
However, there are areas for concern. The static analysis reveals that only 25% of output is properly escaped, meaning a significant portion of outputs may be vulnerable to cross-site scripting (XSS) attacks if the dynamic content used is not sufficiently sanitized beforehand. The lack of nonce checks and capability checks on any entry points (though there are zero entry points) is a potential weakness that could become a risk if new entry points are introduced without proper security measures. The fact that taint analysis yielded no flows is positive, but this is in conjunction with zero analyzed flows, so the analysis might not be comprehensive or the plugin is very simple.
In conclusion, while 'wp-admin-menu-wizard' appears robust due to its minimal attack surface and secure handling of critical areas like SQL, the significant percentage of unescaped output is a notable weakness. The absence of past vulnerabilities is a good indicator, but this should not lead to complacency, especially regarding output sanitization. The plugin's strengths lie in its limited functionality and careful SQL implementation, while its primary weakness lies in output escaping.
Key Concerns
- Unescaped output detected
- No nonce checks on entry points
- No capability checks on entry points
Admin Menu Cleaner Security Vulnerabilities
Admin Menu Cleaner Release Timeline
Admin Menu Cleaner Code Analysis
Output Escaping
Admin Menu Cleaner Attack Surface
WordPress Hooks 7
Maintenance & Trust
Admin Menu Cleaner Maintenance & Trust
Maintenance Signals
Community Trust
Admin Menu Cleaner Alternatives
WP Adminify – White Label WordPress, Admin Menu Editor, Login Customizer
adminify
Transform your WordPress admin into a fully white-labeled, organized client dashboard. Customize, Dark mode, Secure, Boost productivity, and more.
Admin Tools
admin-tools
Admin Tools Helps you to get better admin for your customers. Manage your menus, plugins, Top Bar, updates and more
Menu Organizer
menu-organizer
A simple plugin to organize your admin menus
Move Admin Menu Items
move-admin-menu-items
Move admin menu items to an overview menu page.
WP Total Branding – Complete branding solution for WordPress
wp-total-branding
Make your WordPress truly yours. Customize, clean up, and remove default WordPress footprints, features, and more.
Admin Menu Cleaner Developer Profile
1 plugin · 70 total installs
How We Detect Admin Menu Cleaner
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-admin-menu-wizard/css/admin-menu-cleaner.css/wp-content/plugins/wp-admin-menu-wizard/js/admin-menu-cleaner.js/wp-content/plugins/wp-admin-menu-wizard/js/admin-menu-cleaner.jswp-admin-menu-wizard/css/admin-menu-cleaner.css?ver=wp-admin-menu-wizard/js/admin-menu-cleaner.js?ver=HTML / DOM Fingerprints
ad-mcswitchslideradswitch-chdata-toggle