Ninja Form Layout Security & Risk Analysis

wordpress.org/plugins/ninja-forms-layout

Ninja Forms Layout adds fieldset and div elements.

200 active installs v1.3 PHP + WP 2.8.6+ Updated Dec 28, 2015
divfieldsetlayoutninja-formsninja-forms-layout
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ninja Form Layout Safe to Use in 2026?

Generally Safe

Score 85/100

Ninja Form Layout has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The ninja-forms-layout plugin v1.3 exhibits a generally positive security posture based on the provided static analysis and vulnerability history. The absence of detected AJAX handlers, REST API routes, shortcodes, and cron events significantly reduces the potential attack surface. Furthermore, the code signals indicate a strong adherence to secure coding practices, with no dangerous functions identified, all SQL queries utilizing prepared statements, and no file operations or external HTTP requests. The lack of any known CVEs further reinforces this positive outlook.

However, a significant concern arises from the output escaping analysis. With 100% of the identified outputs not being properly escaped, there is a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data rendered by the plugin that is not explicitly escaped before display could be exploited by attackers to inject malicious scripts into users' browsers. The absence of nonce checks and capability checks, while not directly exploitable given the lack of entry points, indicates a potential gap in security best practices if new entry points were to be introduced in future versions.

In conclusion, while the plugin's current attack surface is minimal and it has a clean vulnerability history, the universal failure to escape output represents a critical weakness. This oversight could lead to severe security implications if user-supplied data is ever rendered without proper sanitization. The strengths lie in the limited attack vectors and secure data handling for SQL, but the unescaped output is a glaring area that requires immediate attention to mitigate the risk of XSS attacks.

Key Concerns

  • All outputs are unescaped (XSS risk)
  • No nonce checks present
  • No capability checks present
Vulnerabilities
None known

Ninja Form Layout Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Ninja Form Layout Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

Ninja Form Layout Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initninja-form-layout.php:19
actioninitninja-form-layout.php:48
actioninitninja-form-layout.php:83
actioninitninja-form-layout.php:119
actioninitninja-form-layout.php:156
Maintenance & Trust

Ninja Form Layout Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedDec 28, 2015
PHP min version
Downloads23K

Community Trust

Rating74/100
Number of ratings3
Active installs200
Developer Profile

Ninja Form Layout Developer Profile

marclloyd77

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ninja Form Layout

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
ninja_forms_field_.*_div_wrap
Data Attributes
rel="[0-9]+"
Shortcode Output
<fieldset</fieldset><div</div>
FAQ

Frequently Asked Questions about Ninja Form Layout