
WP UniformJS Security & Risk Analysis
wordpress.org/plugins/uniform-jsAdds Uniform JS (sexy forms with jQuery) to your wordpress forms.
Is WP UniformJS Safe to Use in 2026?
Generally Safe
Score 85/100WP UniformJS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "uniform-js" plugin v1.1 exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the attack surface. Furthermore, the code signals show no dangerous functions, no direct file operations, no external HTTP requests, and all SQL queries utilize prepared statements, which are strong indicators of secure coding practices. The lack of any recorded vulnerabilities in its history is also a positive sign.
However, a significant concern arises from the output escaping signals. With 7 total outputs and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data rendered to the user interface that is not properly escaped can be exploited by attackers to inject malicious scripts. The lack of capability checks and nonce checks, while not directly indicative of a vulnerability given the limited attack surface, means that if any entry points were to be discovered or introduced in future versions, they would be unprotected. The absence of taint analysis results could be due to the limited scope of the analysis or the plugin's simplicity, but the unescaped output remains the most pressing issue.
In conclusion, while "uniform-js" v1.1 demonstrates strengths in limiting its attack surface and employing secure database practices, the critical lack of output escaping poses a substantial risk. The plugin's vulnerability history is clean, suggesting good development practices to date, but this should not overshadow the immediate danger of unescaped output. Addressing the output escaping issue is paramount for improving the plugin's security.
Key Concerns
- Unescaped output detected
- No capability checks on entry points
- No nonce checks on entry points
WP UniformJS Security Vulnerabilities
WP UniformJS Release Timeline
WP UniformJS Code Analysis
Output Escaping
WP UniformJS Attack Surface
WordPress Hooks 5
Maintenance & Trust
WP UniformJS Maintenance & Trust
Maintenance Signals
Community Trust
WP UniformJS Alternatives
WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More
wpforms-lite
The best WordPress contact form plugin. Drag & Drop form builder to create beautiful contact forms, payment forms, & other custom forms.
Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
fluentform
Get a fast contact form plugin. Create advanced forms using drag and drop form builder with all smart features.
Ninja Forms – The Contact Form Builder That Grows With You
ninja-forms
The 100% beginner friendly WordPress form builder. Drag & drop form fields to build beautiful, professional contact forms in minutes.
SureForms – Contact Form, Payment Form & Other Custom Form Builder
sureforms
The most beginner-friendly AI Form Builder for WordPress. Create contact, payment, quiz & custom forms with advanced features in minutes.
Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder
formidable
The most advanced WordPress forms plugin. Go beyond contact forms with our drag and drop form builder for surveys, quizzes, and more.
WP UniformJS Developer Profile
1 plugin · 10 total installs
How We Detect WP UniformJS
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/uniform-js/js/jquery.uniform.min.js/wp-content/plugins/uniform-js/css/uniform./wp-content/plugins/uniform-js/js/jquery.uniform.min.jsjquery.uniform.min.js?ver=uniform.default.css?ver=uniform.agent.css?ver=uniform.aristo.css?ver=HTML / DOM Fingerprints
jQuery