Online ordering System – ord.to Security & Risk Analysis

wordpress.org/plugins/ordering-system-ord-to

Add menu or ordering widget to your website, manage your product list and start receiving food orders from your clients.

0 active installs v1.0.3 PHP 7.1+ WP 5.6+ Updated Feb 25, 2021
food-deliveryfood-menufood-orderfood-orderingrestaurant-menu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Online ordering System – ord.to Safe to Use in 2026?

Generally Safe

Score 85/100

Online ordering System – ord.to has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The 'ordering-system-ord-to' v1.0.3 plugin exhibits a generally strong security posture based on the static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points is a significant strength. The code also demonstrates good practices by utilizing prepared statements for all SQL queries and by having a very high percentage of properly escaped output. The limited file operations and external HTTP requests, combined with the lack of critical or high severity taint flows, further bolster its security profile.

However, there are a couple of areas that warrant attention. The most notable concern is the complete absence of nonce checks. While the plugin might not have many direct user-facing entry points that typically require nonces (like AJAX or forms), this omission indicates a potential blind spot for securing any future additions or less obvious interaction points. The single capability check might also be insufficient if it's not granular enough or if the actions it protects are sensitive.

The plugin's vulnerability history is also a positive indicator, with no known CVEs ever recorded. This suggests a consistent track record of security awareness by the developers. In conclusion, while the plugin is built with a good foundation of secure coding practices, the lack of nonce checks is a significant omission that could introduce vulnerabilities if the attack surface expands or if certain functionalities are not adequately protected.

Key Concerns

  • Missing nonce checks
  • Limited capability checks
Vulnerabilities
None known

Online ordering System – ord.to Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Online ordering System – ord.to Release Timeline

v1.0.3Current
v1.0.2
Code Analysis
Analyzed Apr 16, 2026

Online ordering System – ord.to Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
20 prepared
Unescaped Output
2
84 escaped
Nonce Checks
0
Capability Checks
1
File Operations
2
External Requests
13
Bundled Libraries
0

SQL Query Safety

100% prepared20 total queries

Output Escaping

98% escaped86 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
ordto_orders_view (includes/ords.php:7)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Online ordering System – ord.to Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionwp_footerincludes/menu_or_widget.php:67
actionwp_footerincludes/menu_or_widget.php:71
actionwp_footerincludes/menu_or_widget.php:72
actionadmin_enqueue_scriptsord_sys.php:110
actionadmin_enqueue_scriptsord_sys.php:111
actionadmin_menuord_sys.php:112
actionwp_enqueue_scriptsord_sys.php:116
Maintenance & Trust

Online ordering System – ord.to Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedFeb 25, 2021
PHP min version7.1
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Online ordering System – ord.to Developer Profile

getreveltd

3 plugins · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Online ordering System – ord.to

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ordering-system-ord-to/admin/css/style.css/wp-content/plugins/ordering-system-ord-to/admin/js/add-menu-script.js
Script Paths
/widget/widget.min.js
Version Parameters
ordering-system-ord-to/admin/css/style.css?ver=ordering-system-ord-to/admin/js/add-menu-script.js?ver=

HTML / DOM Fingerprints

CSS Classes
miniorders-widget-wrapperminiorders-widget-tabminiorders-widget-tab-nameminiorders-widget-closeminiorders-widget-close-img
Data Attributes
data-miniorders-widget-url
JS Globals
miniordersStartWidget
FAQ

Frequently Asked Questions about Online ordering System – ord.to