NinjaScanner – Virus & Malware scan Security & Risk Analysis

wordpress.org/plugins/ninjascanner

A lightweight, fast and powerful virus scanner for WordPress.

30K active installs v3.2.8 PHP 7.1+ WP 4.7.0+ Updated Nov 29, 2025
malwareprotectionscannersecurityvirus
98
A · Safe
CVEs total1
Unpatched0
Last CVEJul 30, 2025
Safety Verdict

Is NinjaScanner – Virus & Malware scan Safe to Use in 2026?

Generally Safe

Score 98/100

NinjaScanner – Virus & Malware scan has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jul 30, 2025Updated 4mo ago
Risk Assessment

The static analysis of ninjascanner v3.2.8 reveals a generally strong security posture. The plugin demonstrates excellent adherence to secure coding practices by having no unprotected AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code signals show a complete absence of dangerous functions, raw SQL queries, and unescaped output. The presence of nonce and capability checks indicates a thoughtful approach to access control. However, the analysis does not include taint analysis, leaving a gap in understanding potential data flow vulnerabilities. The vulnerability history, while showing no currently unpatched CVEs, does indicate a past high-severity vulnerability related to Absolute Path Traversal. The fact that this was resolved and is no longer unpatched is positive, but the nature of the vulnerability is a concern and suggests past potential weaknesses that could resurface if not continuously monitored.

Overall, ninjascanner v3.2.8 appears to be developed with security in mind, particularly in its handling of entry points and data output. The lack of critical or high-severity issues in the current static analysis is commendable. The primary area for caution stems from the past vulnerability history, which highlights a specific type of risk that, while addressed, warrants continued vigilance. The absence of taint analysis means that while no immediate critical flaws are apparent from static code review, the potential for complex, data-dependent vulnerabilities cannot be entirely ruled out without further dynamic analysis.

Key Concerns

  • Past high severity vulnerability
  • Taint analysis not performed
Vulnerabilities
1

NinjaScanner – Virus & Malware scan Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2025-8213high · 7.2Absolute Path Traversal

NinjaScanner – Virus & Malware scan <= 3.2.5 - Authenticated (Administrator+) Arbitrary File Deletion

Jul 30, 2025 Patched in 3.2.6 (2d)
Code Analysis
Analyzed Mar 16, 2026

NinjaScanner – Virus & Malware scan Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
6 escaped
Nonce Checks
1
Capability Checks
5
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped6 total outputs
Attack Surface

NinjaScanner – Virus & Malware scan Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionnscan_garbage_collectorindex.php:144
actionadmin_initindex.php:240
actionadmin_menuindex.php:331
actionnetwork_admin_menuindex.php:333
actionadmin_footerindex.php:419
actionadmin_footerindex.php:425
actionnscan_scheduled_scanindex.php:471
Maintenance & Trust

NinjaScanner – Virus & Malware scan Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedNov 29, 2025
PHP min version7.1
Downloads921K

Community Trust

Rating86/100
Number of ratings33
Active installs30K
Developer Profile

NinjaScanner – Virus & Malware scan Developer Profile

nintechnet

3 plugins · 130K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
619 days
View full developer profile
Detection Fingerprints

How We Detect NinjaScanner – Virus & Malware scan

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ninjascanner/asset/css/nscan-style.css/wp-content/plugins/ninjascanner/asset/css/nscan-fonticon.css/wp-content/plugins/ninjascanner/asset/css/nscan-animate.css/wp-content/plugins/ninjascanner/asset/js/nscan-bootstrap.min.js/wp-content/plugins/ninjascanner/asset/js/nscan-dataTables.min.js/wp-content/plugins/ninjascanner/asset/js/nscan-script.js
Script Paths
/wp-content/plugins/ninjascanner/asset/js/nscan-bootstrap.min.js/wp-content/plugins/ninjascanner/asset/js/nscan-dataTables.min.js/wp-content/plugins/ninjascanner/asset/js/nscan-script.js
Version Parameters
ninjascanner/asset/css/nscan-style.css?ver=ninjascanner/asset/css/nscan-fonticon.css?ver=ninjascanner/asset/css/nscan-animate.css?ver=ninjascanner/asset/js/nscan-bootstrap.min.js?ver=ninjascanner/asset/js/nscan-dataTables.min.js?ver=ninjascanner/asset/js/nscan-script.js?ver=

HTML / DOM Fingerprints

CSS Classes
nscan-section-bodynscan-form-contentnscan-menu-item-iconnscan-btn-defaultnscan-settings-contentnscan-main-contentnscan-rownscan-col+3 more
HTML Comments
<!-- (c) NinTechNet ~ https://nintechnet.com/ --><!-- Both constants are used by NinjaFirewall:<!-- Load (force) our translation files.<!-- Helpers+25 more
Data Attributes
data-toggledata-targetdata-controls-modaldata-backdropdata-keyboarddata-controls-text+8 more
JS Globals
nscan_datanscan_scan_running
REST Endpoints
/wp-json/ninjascanner/v1/scan/start/wp-json/ninjascanner/v1/scan/status/wp-json/ninjascanner/v1/scan/stop/wp-json/ninjascanner/v1/files/list/wp-json/ninjascanner/v1/files/get/wp-json/ninjascanner/v1/files/restore/wp-json/ninjascanner/v1/settings/get/wp-json/ninjascanner/v1/settings/update
FAQ

Frequently Asked Questions about NinjaScanner – Virus & Malware scan