Sugar Events Calendar – Ninja Forms Add-on Security & Risk Analysis

wordpress.org/plugins/sugar-events-calendar-ninja-forms-add-on

Add registrations forms for your Sugar Events Calendar events using Ninja Forms.

10 active installs v1.0 PHP + WP 3.7+ Updated Apr 24, 2014
event-registrationevent-ticketingninja-formssugar-events-calendarsugar-events-calendar-registration
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Sugar Events Calendar – Ninja Forms Add-on Safe to Use in 2026?

Generally Safe

Score 85/100

Sugar Events Calendar – Ninja Forms Add-on has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The sugar-events-calendar-ninja-forms-add-on plugin version 1.0 exhibits an exceptionally strong security posture based on the provided static analysis. The complete absence of any identified attack surface (AJAX handlers, REST API routes, shortcodes, cron events), dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, nonce checks, or capability checks is a significant strength. Furthermore, the taint analysis reveals no flows with unsanitized paths, indicating that data handling within the plugin appears robust. The plugin also has no recorded vulnerability history, further contributing to its perceived security.

However, the analysis does highlight a complete lack of explicit security checks like nonce and capability checks across all potential entry points. While the current static analysis shows zero entry points, this could be an artifact of the analysis itself or the plugin's simplicity. If any functionality were to be added or if the analysis missed a potential entry point, the absence of these fundamental security mechanisms would present a critical risk. The lack of any observed security mechanisms, while currently not problematic, means there is no inherent defense if future code introduces vulnerabilities or if the attack surface expands. In conclusion, the plugin currently appears very secure due to its apparent lack of complex functionality and attack vectors, but the absence of any built-in security controls is a potential future risk that warrants careful consideration if the plugin evolves.

Key Concerns

  • Lack of nonce checks
  • Lack of capability checks
Vulnerabilities
None known

Sugar Events Calendar – Ninja Forms Add-on Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Sugar Events Calendar – Ninja Forms Add-on Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Sugar Events Calendar – Ninja Forms Add-on Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Sugar Events Calendar – Ninja Forms Add-on Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitsugar-calendar-ninja-forms.php:22
actionadd_meta_boxessugar-calendar-ninja-forms.php:41
actionsc_after_event_contentsugar-calendar-ninja-forms.php:56
Maintenance & Trust

Sugar Events Calendar – Ninja Forms Add-on Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedApr 24, 2014
PHP min version
Downloads3K

Community Trust

Rating80/100
Number of ratings2
Active installs10
Developer Profile

Sugar Events Calendar – Ninja Forms Add-on Developer Profile

Eric Daams

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sugar Events Calendar – Ninja Forms Add-on

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sugar-events-calendar-ninja-forms-add-on/languages/

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Sugar Events Calendar – Ninja Forms Add-on