Neartail – Take food orders for weekly changing menu Security & Risk Analysis

wordpress.org/plugins/neartail

Take food orders for weekly changing menu

10 active installs v0.0.5 PHP + WP 4.0+ Updated Sep 10, 2024
ecommerceonline-storeorder-formpayment-formshopping-cart
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Neartail – Take food orders for weekly changing menu Safe to Use in 2026?

Generally Safe

Score 92/100

Neartail – Take food orders for weekly changing menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The neartail plugin v0.0.5 exhibits a strong security posture based on the provided static analysis. All identified entry points, including the single shortcode, are protected by appropriate checks, and there are no direct AJAX handlers or REST API routes exposed without permission callbacks. The code adheres to excellent secure coding practices, with 100% of SQL queries using prepared statements and 100% of output being properly escaped. Furthermore, the absence of dangerous functions, file operations, external HTTP requests, and any critical or high-severity taint flows further bolsters its security. The plugin's vulnerability history is also entirely clean, with zero known CVEs of any severity. This indicates a commitment to secure development or a lack of previously discovered issues, which is a positive sign.

However, despite these strengths, a few areas warrant attention. The complete absence of nonce checks and capability checks, while not immediately leading to exploitable vulnerabilities in this version due to the limited attack surface and protection of existing entry points, represents a potential future risk. Should the attack surface expand or if any of the existing entry points were to be modified without proper authentication or authorization, these missing checks could become critical. The presence of a shortcode, even if currently secured, inherently adds a potential attack vector that requires ongoing vigilance. In conclusion, neartail v0.0.5 is currently very secure due to its limited, protected attack surface and adherence to secure coding practices. The primary area for improvement lies in implementing nonce and capability checks proactively to future-proof the plugin against evolving threats and potential future expansions of its functionality.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
Vulnerabilities
None known

Neartail – Take food orders for weekly changing menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Neartail – Take food orders for weekly changing menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
33 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped33 total outputs
Data Flows
All sanitized

Data Flow Analysis

3 flows
neartail_dashboard_page (neartail.php:81)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Neartail – Take food orders for weekly changing menu Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[neartail] neartail.php:326
WordPress Hooks 2
actionadmin_menuneartail.php:38
actionadmin_initneartail.php:126
Maintenance & Trust

Neartail – Take food orders for weekly changing menu Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedSep 10, 2024
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Neartail – Take food orders for weekly changing menu Developer Profile

manidoraisamy

3 plugins · 1K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
14 days
View full developer profile
Detection Fingerprints

How We Detect Neartail – Take food orders for weekly changing menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/neartail/assets/css/bootstrap.min.css/wp-content/plugins/neartail/assets/css/style.css/wp-content/plugins/neartail/assets/js/home.js/wp-content/plugins/neartail/assets/js/lottie.js
Script Paths
/wp-content/plugins/neartail/assets/js/home.js/wp-content/plugins/neartail/assets/js/lottie.js
Version Parameters
neartail/assets/css/bootstrap.min.css?ver=neartail/assets/css/style.css?ver=neartail/assets/js/home.js?ver=neartail/assets/js/lottie.js?ver=

HTML / DOM Fingerprints

CSS Classes
wrap
Data Attributes
id="myIframe"
JS Globals
neartail_scriptpostMessageToIframepostedMessageiframeintervalpages+5 more
FAQ

Frequently Asked Questions about Neartail – Take food orders for weekly changing menu