Open Dining Menu Security & Risk Analysis

wordpress.org/plugins/open-dining-menu

Show your restaurant's menu and take orders from your WordPress-powered site.

10 active installs v2.0 PHP + WP 2.7+ Updated Jun 16, 2015
foodmenumenusrestaurantrestaurants
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Open Dining Menu Safe to Use in 2026?

Generally Safe

Score 85/100

Open Dining Menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "open-dining-menu" v2.0 plugin exhibits a generally strong security posture, with no recorded vulnerabilities or critical code signals like dangerous functions or unsanitized taint flows. The absence of known CVEs and its unpatched status further contribute to its positive security reputation. Furthermore, the plugin demonstrates good practices by exclusively using prepared statements for its SQL queries and having no file operations or external HTTP requests, significantly reducing common attack vectors. However, the analysis reveals some areas for improvement. With 21% of output escaping, there's a significant portion of unescaped output, which could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is displayed without proper sanitization. Additionally, the lack of any nonce checks, despite having entry points (shortcodes), is a notable concern as it leaves the plugin susceptible to Cross-Site Request Forgery (CSRF) attacks.

Key Concerns

  • Low output escaping percentage
  • Missing nonce checks on entry points
Vulnerabilities
None known

Open Dining Menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Open Dining Menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

21% escaped19 total outputs
Attack Surface

Open Dining Menu Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[opendining_menu] odn-orderbutton.php:23
[opendining_button] odn-orderbutton.php:24
WordPress Hooks 5
actionadmin_menuodn-orderbutton.php:17
actionwp_footerodn-orderbutton.php:18
actionadmin_initodn-orderbutton.php:19
filterplugin_action_linksodn-orderbutton.php:21
actionwidgets_initodn-widget.php:73
Maintenance & Trust

Open Dining Menu Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedJun 16, 2015
PHP min version
Downloads7K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

Open Dining Menu Developer Profile

tim.ridgely

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Open Dining Menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/open-dining-menu/media/js/wp-order-button.js/wp-content/plugins/open-dining-menu/media/js/wp-order-button-handler.js/wp-content/plugins/open-dining-menu/media/js/order-frame.js
Script Paths
https://www.opendining.net/media/js/wp-order-button.jshttps://www.opendining.net/media/js/wp-order-button-handler.jshttps://www.opendining.net/media/js/order-frame.js
Version Parameters
wp-order-button.js?id=wp-order-button-handler.js?id=order-frame.js

HTML / DOM Fingerprints

Data Attributes
id="order-frame"
JS Globals
window.attachEventwindow.addEventListener
Shortcode Output
[opendining_menu][opendining_button]
FAQ

Frequently Asked Questions about Open Dining Menu