Restaurant Security & Risk Analysis

wordpress.org/plugins/restaurant

A restaurant and menu item manager for small restaurant sites, which can be extended for larger sites.

40 active installs v1.0.0 PHP + WP 3.7+ Updated Unknown
custom-post-typerestauranttaxonomy
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Restaurant Safe to Use in 2026?

Generally Safe

Score 100/100

Restaurant has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "restaurant" v1.0.0 plugin exhibits a generally strong security posture based on the provided static analysis. It demonstrates good practices by having no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero-total attack surface. The code also shows a commitment to secure database operations, with 100% of SQL queries using prepared statements, and a notable presence of nonce and capability checks.

However, a critical concern arises from the taint analysis, which reveals two flows with unsanitized paths. While the severity is not explicitly classified as critical or high, the presence of unsanitized paths in any flow is a significant risk, potentially allowing for code injection or arbitrary file access if these flows are triggered by external input. The output escaping also has room for improvement, with 19% of outputs not being properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities.

The plugin's vulnerability history is a significant strength, showing no known CVEs, unpatched vulnerabilities, or common vulnerability types. This suggests a stable and well-maintained codebase in terms of past security issues. In conclusion, while the plugin has excellent strengths in its minimal attack surface and lack of historical vulnerabilities, the identified unsanitized paths in taint flows and incomplete output escaping represent the primary areas of immediate concern that require attention.

Key Concerns

  • Unsanitized paths found in taint flows
  • Unescaped output detected
Vulnerabilities
None known

Restaurant Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Restaurant Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
17 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

81% escaped21 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
tags_dropdown (admin\class-restaurant-admin.php:120)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Restaurant Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 23
actionload-post.phpadmin\class-restaurant-admin.php:35
actionload-post-new.phpadmin\class-restaurant-admin.php:36
actionload-edit.phpadmin\class-restaurant-admin.php:39
filtermanage_edit-restaurant_item_columnsadmin\class-restaurant-admin.php:42
filtermanage_edit-restaurant_item_sortable_columnsadmin\class-restaurant-admin.php:43
actionmanage_restaurant_item_posts_custom_columnadmin\class-restaurant-admin.php:44
filterrequestadmin\class-restaurant-admin.php:58
actionrestrict_manage_postsadmin\class-restaurant-admin.php:59
actionadmin_headadmin\class-restaurant-admin.php:60
actionadd_meta_boxesadmin\class-restaurant-post-meta-boxes.php:25
actionsave_postadmin\class-restaurant-post-meta-boxes.php:27
actionadmin_menuadmin\class-restaurant-settings.php:51
actionadmin_initadmin\class-restaurant-settings.php:75
filterpost_type_archive_titleinc\core.php:16
actioninitinc\core.php:19
actioninitinc\post-types.php:15
filterpost_updated_messagesinc\post-types.php:18
filterenter_title_hereinc\post-types.php:21
actioninitinc\taxonomies.php:15
actionplugins_loadedrestaurant.php:64
actionplugins_loadedrestaurant.php:67
actionplugins_loadedrestaurant.php:70
actionplugins_loadedrestaurant.php:73
Maintenance & Trust

Restaurant Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedUnknown
PHP min version
Downloads9K

Community Trust

Rating100/100
Number of ratings2
Active installs40
Developer Profile

Restaurant Developer Profile

Justin Tadlock

33 plugins · 34K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Restaurant

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/restaurant/inc/template.php/wp-content/plugins/restaurant/admin/class-restaurant-admin.php/wp-content/plugins/restaurant/admin/class-restaurant-settings.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Restaurant