Xenial – Divi Schema Menu Security & Risk Analysis

wordpress.org/plugins/xenial-divi-schema-menu

Auto generated schema plugin

0 active installs v1.0.3 PHP 5.6.20+ WP 4.0.0+ Updated May 30, 2019
divigoogle-seoschemaschema-navseo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Xenial – Divi Schema Menu Safe to Use in 2026?

Generally Safe

Score 85/100

Xenial – Divi Schema Menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "xenial-divi-schema-menu" plugin v1.0.3 exhibits a strong security posture. The static analysis reveals a remarkably clean codebase with no identified dangerous functions, no raw SQL queries, and all output being properly escaped. The absence of file operations and external HTTP requests further minimizes potential attack vectors. Crucially, there are no identified taint flows, indicating that user-supplied data is not being mishandled in a way that could lead to vulnerabilities.

The plugin's vulnerability history is also exemplary, with zero recorded CVEs. This suggests a consistent commitment to secure development practices or a lack of past vulnerabilities being discovered. The presence of capability checks, even though the total attack surface is zero, indicates an awareness of WordPress security mechanisms.

Overall, this plugin appears to be very secure. The lack of any identified vulnerabilities in code analysis or history, coupled with good coding practices like prepared statements and output escaping, makes it a low-risk option. The only area of note, though minor given the current state, is the absence of nonce checks and a very limited attack surface. However, with no identified entry points, this is not an immediate concern.

Vulnerabilities
None known

Xenial – Divi Schema Menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Xenial – Divi Schema Menu Release Timeline

v1.0.3Current
vDiviSchemaMenu-1.0.1
vDiviSchemaMenu
Code Analysis
Analyzed Mar 17, 2026

Xenial – Divi Schema Menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Xenial – Divi Schema Menu Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_headincludes\dsm-cssIncludes.php:25
actionwp_enqueue_scriptsincludes\dsm-javaScriptIncludes.php:26
actionadmin_enqueue_scriptsincludes\dsm-javaScriptIncludes.php:45
actionadmin_menuincludes\dsm-menuIncludes.php:50
actionall_admin_noticesincludes\dsm-menuIncludes.php:85
Maintenance & Trust

Xenial – Divi Schema Menu Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.0
Last updatedMay 30, 2019
PHP min version5.6.20
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Xenial – Divi Schema Menu Developer Profile

Joshua Trimm

3 plugins · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Xenial – Divi Schema Menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/xenial-divi-schema-menu/js/schemaNav.js/wp-content/plugins/xenial-divi-schema-menu/js/checkAllPages.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Xenial – Divi Schema Menu