Restaurant Menu Ordering Security & Risk Analysis

wordpress.org/plugins/restaurant-menu-ordering

This plugin enables hierarchical ordering of items created by the Restaurant plugin.

10 active installs v1.0 PHP + WP 3.9+ Updated Unknown
restaurant
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Restaurant Menu Ordering Safe to Use in 2026?

Generally Safe

Score 100/100

Restaurant Menu Ordering has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

Based on the static analysis, the "restaurant-menu-ordering" v1.0 plugin exhibits a strong security posture in its current state. The absence of any identified dangerous functions, SQL queries not using prepared statements, or unescaped output is commendable. Furthermore, the lack of file operations, external HTTP requests, and a seemingly minimal attack surface with no evident unprotected entry points suggest a well-developed and secure codebase from a static analysis perspective. The taint analysis also shows no critical or high severity flows, reinforcing this positive assessment.

However, the analysis also reveals significant areas of concern. The complete lack of nonce checks and capability checks, across all identified entry points (even though there are none listed in this specific report), is a substantial weakness. If any entry points were to be introduced or discovered, the absence of these fundamental WordPress security mechanisms would leave them vulnerable to various attacks. The vulnerability history being completely clear is a positive sign, but it doesn't mitigate the inherent risks present in the code's security implementation. While the plugin appears clean now, the lack of basic security controls is a critical underlying risk that needs to be addressed before any further development or deployment.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
Vulnerabilities
None known

Restaurant Menu Ordering Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Restaurant Menu Ordering Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Restaurant Menu Ordering Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionregistered_post_typerestaurant-menu-ordering.php:23
filterpre_get_postsrestaurant-menu-ordering.php:44
Maintenance & Trust

Restaurant Menu Ordering Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Restaurant Menu Ordering Developer Profile

Topher

10 plugins · 190 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Restaurant Menu Ordering

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Restaurant Menu Ordering