Import from Ning Security & Risk Analysis

wordpress.org/plugins/import-from-ning

Imports the contents of a Ning Network Archive into BuddyPress

10 active installs v2.1 PHP + WP + Updated May 21, 2013
buddypressimportning
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Import from Ning Safe to Use in 2026?

Generally Safe

Score 85/100

Import from Ning has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "import-from-ning" v2.1 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices in its database interactions, with 100% of SQL queries utilizing prepared statements, significantly mitigating the risk of SQL injection. Furthermore, there are no known CVEs associated with this plugin, and its attack surface is reported as zero entry points, suggesting a well-contained design in terms of common web vulnerabilities like AJAX handlers, REST API routes, shortcodes, and cron events.

However, several concerns emerge from the static analysis. The low percentage of properly escaped output (38%) is a significant weakness, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. Taint analysis also reveals two flows with unsanitized paths, and while no critical or high severity issues were flagged, these unsanitized paths represent potential vectors for malicious code execution or data manipulation if an attacker can control the input leading to these paths. The absence of nonce checks and capability checks across all entry points (which are reported as zero, but the analysis suggests a lack of checks where they might be expected if entry points existed) is concerning, as it implies a lack of authorization and validation on any potential, albeit currently undiscovered, entry points.

Given the lack of vulnerability history and the minimal reported attack surface, the plugin may be relatively safe in its current state. However, the prevalent output escaping issues and unsanitized taint flows are substantial risks that should be addressed to improve its overall security. The developer should prioritize fixing these identified code-level weaknesses.

Key Concerns

  • Insufficient output escaping
  • Unsanitized paths in taint flows
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Import from Ning Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Import from Ning Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
12 prepared
Unescaped Output
26
16 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared12 total queries

Output Escaping

38% escaped42 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
bp_ning_import_sent_email_markup (bp-functions.php:1771)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Import from Ning Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionbp_includeimport-from-ning.php:15
Maintenance & Trust

Import from Ning Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedMay 21, 2013
PHP min version
Downloads11K

Community Trust

Rating66/100
Number of ratings4
Active installs10
Developer Profile

Import from Ning Developer Profile

Boone Gorges

27 plugins · 12K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
1864 days
View full developer profile
Detection Fingerprints

How We Detect Import from Ning

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/import-from-ning/style.css

HTML / DOM Fingerprints

JS Globals
WP_CONTENT_DIRBP_AVATAR_UPLOAD_PATH
FAQ

Frequently Asked Questions about Import from Ning