TM Lunch Menu Security & Risk Analysis

wordpress.org/plugins/tm-lunch-menu

Allows for easy widgetized display of simple lunch menus (or other day based lists).

10 active installs v1.0.2 PHP + WP 3.0+ Updated Apr 1, 2012
lunchlunch-menumenutechnical-mastermindtm
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is TM Lunch Menu Safe to Use in 2026?

Generally Safe

Score 85/100

TM Lunch Menu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "tm-lunch-menu" v1.0.2 plugin exhibits a mixed security posture. On the positive side, there are no known CVEs, a zero-dollar attack surface with no unprotected entry points (AJAX, REST API, shortcodes, cron), and all SQL queries utilize prepared statements. Nonce and capability checks are present, indicating some awareness of WordPress security best practices. However, the presence of the `create_function` PHP function is a significant concern, as it is deprecated and can be a source of vulnerabilities if not handled with extreme care, especially in older PHP versions. Furthermore, a low percentage (13%) of output escaping is concerning, suggesting potential cross-site scripting (XSS) vulnerabilities where user-supplied data might be rendered directly to the browser without proper sanitization. While the taint analysis found only one flow with unsanitized paths and no critical or high severity issues, the low output escaping rate could lead to such issues being overlooked or becoming exploitable in specific contexts.

Overall, the plugin has strengths in its minimal attack surface and proper SQL handling. The lack of historical vulnerabilities is a good sign, but the `create_function` usage and poor output escaping represent clear areas of weakness. These code-level issues, despite the absence of documented external exploits, introduce inherent risks that could be exploited by a determined attacker. The plugin's security is heavily reliant on the absence of exploitable paths for the identified code signals and a lack of historical disclosures, rather than inherently robust secure coding practices across all areas.

Key Concerns

  • Dangerous function `create_function` used
  • Low output escaping percentage (13%)
  • Taint flow with unsanitized path found
Vulnerabilities
None known

TM Lunch Menu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

TM Lunch Menu Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
33
5 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("tm_lunch_menu_widget");'));index.php:334

Output Escaping

13% escaped38 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<admin-settings> (inc\meta-boxes\admin-settings.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

TM Lunch Menu Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 19
actionadd_meta_boxesinc\meta_box.php:52
actionsave_postinc\meta_box.php:55
actionadmin_noticesinc\meta_box.php:57
filterredirect_post_locationinc\meta_box.php:135
filtergenerate_rewrite_rulesinc\post_type.php:122
actioninitinc\post_type.php:130
filtertemplate_includeinc\post_type.php:133
actionwp_headinc\post_type.php:136
filterbody_classinc\post_type.php:139
actioninitindex.php:75
actionadmin_enqueue_scriptsindex.php:81
actionadmin_print_stylesindex.php:82
actionadmin_menuindex.php:85
filtermanage_edit-tm_lunch_menu_columnsindex.php:93
actionmanage_tm_lunch_menu_posts_custom_columnindex.php:94
filtermanage_edit-tm_lunch_menu_sortable_columnsindex.php:95
filterrequestindex.php:96
filteredit_meta_box-tm_lunch_menu_meta_boxindex.php:167
actionwidgets_initindex.php:334
Maintenance & Trust

TM Lunch Menu Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedApr 1, 2012
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

TM Lunch Menu Developer Profile

David Wood

2 plugins · 210 total installs

76
trust score
Avg Security Score
74/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect TM Lunch Menu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/tm-lunch-menu/js/jquery.ui.datepicker.min.js/wp-content/plugins/tm-lunch-menu/js/date-time.js/wp-content/plugins/tm-lunch-menu/js/tm_lunch_menusave.js/wp-content/plugins/tm-lunch-menu/css/jquery-ui-smoothness.css
Script Paths
/wp-content/plugins/tm-lunch-menu/js/jquery.ui.datepicker.min.js/wp-content/plugins/tm-lunch-menu/js/date-time.js/wp-content/plugins/tm-lunch-menu/js/tm_lunch_menusave.js
Version Parameters
tm-lunch-menu/js/jquery.ui.datepicker.min.js?ver=tm-lunch-menu/js/date-time.js?ver=tm-lunch-menu/js/tm_lunch_menusave.js?ver=tm-lunch-menu/css/jquery-ui-smoothness.css?ver=

HTML / DOM Fingerprints

JS Globals
window.tmDateTimevar tmDateTime
FAQ

Frequently Asked Questions about TM Lunch Menu