RestaurantOps Security & Risk Analysis

wordpress.org/plugins/restaurantops-orders

RestaurantOps enables you to manage your menu, add online ordering, and receive notifications on your Clover System. RestaurantOps is the best way to …

20 active installs v1.0.2 PHP + WP 3.4+ Updated Jan 4, 2019
deliveryonline-orderingordering-pluginrestaurantrestaurants
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is RestaurantOps Safe to Use in 2026?

Generally Safe

Score 85/100

RestaurantOps has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "restaurantops-orders" plugin v1.0.2 exhibits a generally strong security posture based on the provided static analysis. The absence of known CVEs and vulnerabilities in its history is a positive indicator, suggesting a commitment to security by the developers. Furthermore, the code analysis reveals no dangerous functions, no direct SQL queries (all are prepared), no file operations, and no external HTTP requests, all of which are excellent security practices. The limited attack surface of only one shortcode, with no unprotected entry points identified, further strengthens its security. However, there are areas for concern. The plugin lacks nonce checks and capability checks entirely. While no direct vulnerabilities were found in the taint analysis or static code, the absence of these checks creates a significant potential for Cross-Site Request Forgery (CSRF) and privilege escalation vulnerabilities if any user-facing functionality, even within the shortcode, were to interact with backend operations. The 67% proper output escaping also indicates a potential for Cross-Site Scripting (XSS) vulnerabilities in the unescaped portion of the outputs.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Partial output escaping
Vulnerabilities
None known

RestaurantOps Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

RestaurantOps Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped6 total outputs
Attack Surface

RestaurantOps Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[restaurantops_widget] includes\core.php:26
WordPress Hooks 4
actionadmin_initincludes\core.php:8
actionwp_headincludes\embed.php:4
actionadmin_menuincludes\menus.php:4
actionadmin_bar_menuincludes\menus.php:7
Maintenance & Trust

RestaurantOps Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedJan 4, 2019
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

RestaurantOps Developer Profile

restaurantops

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RestaurantOps

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/restaurantops-orders/assets/restaurantops-icon-16x16-white.png

HTML / DOM Fingerprints

HTML Comments
<!-- Start RestaurantOps By WP-Plugin: RestaurantOps --><!-- end: RestaurantOps Code. -->
Shortcode Output
<div id="order-widget" ></div>
FAQ

Frequently Asked Questions about RestaurantOps