RestroPress – Menu Cart Security & Risk Analysis

wordpress.org/plugins/restropress-menu-cart

The RestroPress - Menu Cart plugin is useful for the RestroPress users who want to show a cart menu on the header.

10 active installs v1.0.3 PHP + WP 5.4+ Updated Feb 19, 2026
menu-cartonline-orderingrestaurantsrestropress
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is RestroPress – Menu Cart Safe to Use in 2026?

Generally Safe

Score 100/100

RestroPress – Menu Cart has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "restropress-menu-cart" v1.0.3 plugin exhibits a mixed security posture. On one hand, the absence of any recorded CVEs and the use of prepared statements for SQL queries suggest a degree of attention to common vulnerabilities. However, the static analysis reveals significant concerns regarding its attack surface. With two AJAX handlers identified, and crucially, both lacking authentication checks, this presents a direct pathway for unauthenticated attackers to potentially interact with sensitive functionality.

The code signals are largely positive, with no dangerous functions, no raw SQL, and no file operations, which are good indicators. The presence of external HTTP requests and a moderate rate of output escaping (67%) are areas to monitor, though not immediately critical. Taint analysis results show no identified flows, which is a positive sign that at least in the analyzed paths, sensitive data is being handled securely. The lack of any recorded vulnerabilities in its history is a strength, implying a generally stable codebase.

In conclusion, while the plugin benefits from a clean vulnerability history and good practices in database and file handling, the two unprotected AJAX endpoints are a substantial risk. This creates a clear and easily exploitable attack surface that could lead to unintended actions or data exposure if not addressed. The plugin's strengths lie in its internal code robustness, but its external interface needs immediate attention.

Key Concerns

  • Unprotected AJAX handlers
  • Lack of nonce checks on AJAX
  • Moderate output escaping (67%)
Vulnerabilities
None known

RestroPress – Menu Cart Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

RestroPress – Menu Cart Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

67% escaped3 total outputs
Attack Surface
2 unprotected

RestroPress – Menu Cart Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

noprivwp_ajax_restropress_menu_cart_get_cart_detailspublic\class-restropress-menu-cart-public.php:41
authwp_ajax_restropress_menu_cart_get_cart_detailspublic\class-restropress-menu-cart-public.php:42
WordPress Hooks 9
filterrpress_settings_generaladmin\class-restropress-menu-cart-admin.php:32
filterrpress_settings_sections_generaladmin\class-restropress-menu-cart-admin.php:33
actionadmin_noticesincludes\class-restropress-menu-cart-loader.php:31
actionplugins_loadedincludes\class-restropress-menu-cart.php:114
actionadmin_enqueue_scriptsincludes\class-restropress-menu-cart.php:129
actionadmin_enqueue_scriptsincludes\class-restropress-menu-cart.php:130
actionwp_enqueue_scriptsincludes\class-restropress-menu-cart.php:145
actionwp_enqueue_scriptsincludes\class-restropress-menu-cart.php:146
filterwp_nav_menu_itemspublic\class-restropress-menu-cart-public.php:40
Maintenance & Trust

RestroPress – Menu Cart Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 19, 2026
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

RestroPress – Menu Cart Developer Profile

Magnigenie

8 plugins · 2K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
320 days
View full developer profile
Detection Fingerprints

How We Detect RestroPress – Menu Cart

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/restropress-menu-cart/admin/css/restropress-menu-cart-admin.css/wp-content/plugins/restropress-menu-cart/admin/js/restropress-menu-cart-admin.js/wp-content/plugins/restropress-menu-cart/public/css/restropress-menu-cart-public.css/wp-content/plugins/restropress-menu-cart/public/js/restropress-menu-cart-public.js
Script Paths
admin/js/restropress-menu-cart-admin.jspublic/js/restropress-menu-cart-public.js
Version Parameters
restropress-menu-cart-admin.css?ver=restropress-menu-cart-admin.js?ver=restropress-menu-cart-public.css?ver=restropress-menu-cart-public.js?ver=

HTML / DOM Fingerprints

CSS Classes
menu_cart_headingdisplay_icondisplay_menu
Data Attributes
data-cart-id
JS Globals
restropress_menu_cart_params
Shortcode Output
[restropress_menu_cart]
FAQ

Frequently Asked Questions about RestroPress – Menu Cart