WP Float Admin Menu Security & Risk Analysis

wordpress.org/plugins/wp-float-admin-menu

Re-positions your wordpress admin menu from the left side to the top. Have a less cluttered admin area for you or your clients to use

10 active installs v2.0.1 PHP + WP 3.0.1+ Updated Jul 14, 2014
adminadmin-baradmin-menucustom-admin-menumove-admin-menu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Float Admin Menu Safe to Use in 2026?

Generally Safe

Score 85/100

WP Float Admin Menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The plugin "wp-float-admin-menu" v2.0.1 exhibits a generally good security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the analysis indicates no direct usage of dangerous functions, no file operations, and no external HTTP requests, which are all positive security indicators. The fact that all SQL queries utilize prepared statements is excellent practice, mitigating the risk of SQL injection vulnerabilities.

However, a significant concern arises from the output escaping analysis, where 100% of outputs are not properly escaped. This presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities, as unsanitized data displayed to users can be manipulated to execute malicious scripts within their browser context. The absence of nonce checks and capability checks also means that even if an entry point were discovered, there are no built-in mechanisms to verify user authorization or prevent request forgery.

The plugin's vulnerability history is clean, with no known CVEs. This, combined with the lack of critical or high severity taint flows, suggests a history of secure development or a lack of complex functionalities that might inherently harbor such issues. Despite the lack of historical vulnerabilities, the identified output escaping flaw is a serious concern that requires immediate attention to ensure user data and site integrity are protected.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Float Admin Menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Float Admin Menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

WP Float Admin Menu Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menusrc\wp-float-admin-menu.php:20
actioninitsrc\wp-float-admin-menu.php:21
actionadmin_initsrc\wp-float-admin-menu.php:22
filtershow_admin_barsrc\wp-float-admin-menu.php:25
actionadmin_enqueue_scriptssrc\wp-float-admin-menu.php:26
Maintenance & Trust

WP Float Admin Menu Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedJul 14, 2014
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

WP Float Admin Menu Developer Profile

Ola

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Float Admin Menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-float-admin-menu/src/js/wp-float-admin-menu.js/wp-content/plugins/wp-float-admin-menu/src/css/wp-float-admin-menu.css
Script Paths
//platform.twitter.com/widgets.js

HTML / DOM Fingerprints

CSS Classes
wrapicon32postboxupdatederrorinside
Data Attributes
data-show-countdata-langdata-size
JS Globals
wpfam-main-jswpfam-main-csstwitter-wjs
FAQ

Frequently Asked Questions about WP Float Admin Menu