CFS – Ninja Forms Selector Security & Risk Analysis

wordpress.org/plugins/cfs-ninja-forms-selector

The Ninja Forms field type for Custom Field Suite

10 active installs v1.0.1 PHP + WP 3.9+ Updated Unknown
cfscustom-field-suitefield-typeninja-forms
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CFS – Ninja Forms Selector Safe to Use in 2026?

Generally Safe

Score 100/100

CFS – Ninja Forms Selector has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

Based on the static analysis and vulnerability history provided, the cfs-ninja-forms-selector plugin v1.0.1 presents a very low security risk. The code analysis indicates a clean codebase with no identified dangerous functions, SQL queries not using prepared statements, or file operations. All output is properly escaped, and there are no external HTTP requests. The absence of any entry points like AJAX handlers, REST API routes, or shortcodes significantly limits the plugin's attack surface. Furthermore, the complete lack of any recorded vulnerabilities or CVEs in its history suggests a mature and well-maintained plugin, or one that has not yet attracted malicious attention. This combination of secure coding practices and a clean vulnerability record leads to a strong overall security posture. However, the complete absence of nonce checks and capability checks, while not directly exploitable given the lack of entry points, represents a potential weakness if the plugin were to be extended or modified in the future to include such entry points without proper security considerations. This area warrants attention for future development.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

CFS – Ninja Forms Selector Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CFS – Ninja Forms Selector Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped8 total outputs
Attack Surface

CFS – Ninja Forms Selector Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filtercfs_field_typescfs-ninja-forms-selector.php:37
Maintenance & Trust

CFS – Ninja Forms Selector Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CFS – Ninja Forms Selector Developer Profile

JR Tashjian

6 plugins · 160 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CFS – Ninja Forms Selector

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cfs-ninja-forms-selector/cfs-ninja-forms-field.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about CFS – Ninja Forms Selector