Food Lister Security & Risk Analysis

wordpress.org/plugins/easy-csv-restaurant-menus

Food Lister Easy Menu plugin - Create orderable restaurant menus from a CSV file! Includes cost calculator + email order details using Contact Form 7.

10 active installs v1.0 PHP + WP 3.0.1+ Updated Jul 8, 2016
foodmenusrestaurant
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Food Lister Safe to Use in 2026?

Generally Safe

Score 85/100

Food Lister has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "easy-csv-restaurant-menus" plugin version 1.0 presents a mixed security profile. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries and implementing nonce and capability checks, which are crucial for protecting against common web vulnerabilities. The absence of known CVEs and a clean vulnerability history further suggests a generally stable and secure development approach so far.

However, significant concerns arise from the static analysis. The presence of the `unserialize` function, a known vector for remote code execution if not handled with extreme care, is a major red flag. Coupled with this is the finding of unsanitized paths in the taint analysis, which, if exploited in conjunction with `unserialize`, could lead to directory traversal or arbitrary file access. The fact that 100% of output is not properly escaped also presents a risk of cross-site scripting (XSS) vulnerabilities, as user-supplied data could be injected into the rendered page without adequate sanitization.

While the plugin has a small attack surface and no known past vulnerabilities, these code-level risks cannot be ignored. The potential for serious compromise exists if the `unserialize` function is used with untrusted input that is also part of an unsanitized path flow, or if unescaped outputs allow for XSS. Developers should prioritize addressing these specific code issues to strengthen the plugin's overall security posture.

Key Concerns

  • Dangerous function 'unserialize' used
  • Flows with unsanitized paths found
  • 0% output escaping
  • File operations detected
Vulnerabilities
None known

Food Lister Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Food Lister Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
2
Capability Checks
1
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$b=unserialize($a);food_lister.php:261

Output Escaping

0% escaped7 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
food_lister_output_order_items (food_lister.php:536)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Food Lister Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[food_lister] food_lister.php:342
[canape_calc] food_lister.php:343
[output_ordered_items] food_lister.php:344
WordPress Hooks 7
actionadmin_enqueue_scriptsfood_lister.php:32
actionadmin_initfood_lister.php:64
actionadmin_menufood_lister.php:69
actionwp_enqueue_scriptsfood_lister.php:346
filterupload_mimesfood_lister.php:349
actioninitfood_lister.php:662
actionadmin_enqueue_scriptsfood_lister.php:674
Maintenance & Trust

Food Lister Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJul 8, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Food Lister Developer Profile

James Reed

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Food Lister

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/easy-csv-restaurant-menus/js/food_lister_admin.js/wp-content/plugins/easy-csv-restaurant-menus/css/food_lister_admin.css/wp-content/plugins/easy-csv-restaurant-menus/css/jquery-ui.css
Script Paths
/wp-content/plugins/easy-csv-restaurant-menus/js/food_lister_admin.js

HTML / DOM Fingerprints

CSS Classes
food_lister_notice
Data Attributes
id="upload_to_media_button"id="add_cf7_form"name="add_cf7_form"id="add_food_lister_page"name="add_food_lister_page"id="foot_lister_contact_form"+1 more
Shortcode Output
[food_lister menufile=[canape_calc][output_ordered_items]
FAQ

Frequently Asked Questions about Food Lister