Snillrik Restaurant Menu Security & Risk Analysis

wordpress.org/plugins/snillrik-restaurant-menu

Easiest way to maintain a menu that changes every day, like a lunchmenu or "Today's special".

0 active installs v2.3.1 PHP + WP 4.5.2+ Updated Unknown
lunch-menurestaurantshortcodes
99
A · Safe
CVEs total1
Unpatched0
Last CVEJan 6, 2026
Safety Verdict

Is Snillrik Restaurant Menu Safe to Use in 2026?

Generally Safe

Score 99/100

Snillrik Restaurant Menu has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jan 6, 2026
Risk Assessment

The "snillrik-restaurant-menu" plugin v2.3.1 exhibits a generally strong security posture, largely due to robust input validation and output escaping practices. The static analysis reveals a very limited attack surface with no identified AJAX handlers or REST API routes that lack proper authentication or permission checks. Furthermore, all SQL queries are properly prepared, and file operations and external HTTP requests are absent, significantly reducing common attack vectors. The presence of nonce and capability checks on the identified entry points is also a positive indicator of secure development.

However, the plugin's vulnerability history, despite having no currently unpatched vulnerabilities, does present a concern. The existence of one past CVE, specifically related to Cross-site Scripting (XSS), indicates that the plugin has been susceptible to input manipulation that could lead to the execution of malicious scripts. While the most recent vulnerability is dated in the future (2026-01-06 20:40:34), which is likely an anomaly in the data, it doesn't negate the fact that XSS has been an issue. This suggests that while current code may be more secure, developers should remain vigilant about sanitizing all user-supplied data to prevent potential XSS flaws in future updates or unforeseen interactions.

In conclusion, the plugin demonstrates a good understanding of core WordPress security principles. The limited attack surface, secure SQL handling, and proper escaping are commendable. The historical XSS vulnerability, however, warrants a cautious approach, emphasizing the continued need for diligent sanitization and thorough security testing. The overall risk is moderate, with potential for improvement in consistently preventing past vulnerability types.

Key Concerns

  • Past XSS vulnerability history
Vulnerabilities
1

Snillrik Restaurant Menu Security Vulnerabilities

CVEs by Year

1 CVE in 2026
2026
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-14112medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Snillrik Restaurant <= 2.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'menu_style' Shortcode Attribute

Jan 6, 2026 Patched in 2.3.1 (17d)
Code Analysis
Analyzed Mar 17, 2026

Snillrik Restaurant Menu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
113 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

93% escaped121 total outputs
Attack Surface

Snillrik Restaurant Menu Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[snillrik_restaurant_menu] classes\shortcodes.php:15
[snillrik_restaurant_dishes] classes\shortcodes.php:16
WordPress Hooks 19
actioninitclasses\dish.php:15
actionsave_postclasses\dish.php:16
filterthe_contentclasses\dish.php:17
actioninitclasses\elementor\elementor.php:16
actionplugins_loadedclasses\elementor\elementor.php:17
actionelementor/initclasses\elementor\widgets.php:30
actionadmin_noticesclasses\elementor\widgets.php:42
actionadmin_noticesclasses\elementor\widgets.php:48
actionadmin_noticesclasses\elementor\widgets.php:54
actionelementor/widgets/registerclasses\elementor\widgets.php:140
actionelementor/controls/registerclasses\elementor\widgets.php:141
actioninitclasses\menu.php:15
actionsave_postclasses\menu.php:16
filterthe_contentclasses\menu.php:17
actionadmin_menuclasses\settings.php:13
actionadmin_initclasses\settings.php:26
actionwidgets_initclasses\widgets.php:5
actionadmin_enqueue_scriptssnillrik-restaurant-menu.php:40
actionwp_enqueue_scriptssnillrik-restaurant-menu.php:56
Maintenance & Trust

Snillrik Restaurant Menu Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Snillrik Restaurant Menu Developer Profile

mattiaspkallio

3 plugins · 30 total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
404 days
View full developer profile
Detection Fingerprints

How We Detect Snillrik Restaurant Menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/snillrik-restaurant-menu/css/settings-page.css/wp-content/plugins/snillrik-restaurant-menu/js/snillrik_restaurant.js/wp-content/plugins/snillrik-restaurant-menu/css/snillrik_restaurant.css/wp-content/plugins/snillrik-restaurant-menu/js/snillrik_restaurant_front.js/wp-content/plugins/snillrik-restaurant-menu/css/snillrik_restaurant_admin.css
Script Paths
/wp-content/plugins/snillrik-restaurant-menu/js/snillrik_restaurant.js/wp-content/plugins/snillrik-restaurant-menu/js/snillrik_restaurant_front.js
Version Parameters
snillrik-restaurant-menu/css/snillrik_restaurant_admin.css?ver=snillrik-restaurant-menu/js/snillrik_restaurant.js?ver=snillrik-restaurant-menu/css/settings-page.css?ver=snillrik-restaurant-menu/css/snillrik_restaurant.css?ver=snillrik-restaurant-menu/js/snillrik_restaurant_front.js?ver=

HTML / DOM Fingerprints

CSS Classes
snillrik-restaurant-menu-admin-blocksnillrik_restaurant-le
Data Attributes
name="snillrik_restaurant_dishmeta_noncename"id="snillrik_restaurant_dishmeta_noncename"
REST Endpoints
/wp-json/wp/v2/dishes-category/wp-json/wp/v2/dishes-tags/wp-json/wp/v2/snillrik_lm_dish
FAQ

Frequently Asked Questions about Snillrik Restaurant Menu