Is "Ninja Forms" safe?

WordPress Plugin security and safety information.

Rating: Good (current version safe) Recommendations

Ninja Forms: Plugin Details

Type: Plugin
Author: The WP Ninjas
Latest Version: 3.2.14


Ninja Forms: Security Information

Insecure versions: Up To 3.2.13
Known since: 2018-02-23 02:02:16

Insecure versions: Up To
Known since: 2016-08-17 14:27:20

Insecure versions: Up To 2.9.51
Known since: 2016-07-21 02:01:33

Insecure versions: Up To 2.9.42
Known since: 2016-05-05 13:35:29

Insecure versions: Up To 2.9.27
Known since: 2015-11-11 19:23:24

Insecure versions: Up To 2.9.18
Known since: 2015-09-13 21:26:50

Insecure versions: Up To 2.9.18
Known since: 2015-09-13 21:26:50


Ninja Forms: Safety Recommendations

We have rated Ninja Forms as Good (current version safe) which means that we have found vulnerabilities in older versions.

We recommend that you only use the latest version of Ninja Forms.

Ninja Forms: Staying Up-to-date

Make sure your installation of Ninja Forms is safe with the following free Jetpack services for WordPress sites:
  • Updates & Management
    Turn on auto-updates for Ninja Forms or manage in bulk.
  • Prevent Infiltrations
    Automatic protection against brute force attacks and secure sign on.

Choose Your Plan

Ninja Forms: Keeping Safe

If you're running a business, ecommerce, news, or other critical website, Jetpack also provides additional indispensable services:
  • Automated Backups
    Full backup of your entire site with unlimited storage space.
  • Restores & Migrations
    Restore or migrate your site from a backup with one click.
  • Security Scanning
    Regular, automated scans of your site for malware, threats, and hacks.
  • Expert Support
    Fast, priority support for any WordPress security issue.

Choose Your Plan

About this information

This WordPress security information is part of our security library and is brought to you by Jetpack as part of our committment to a safer WordPress experience.

If you have any questions, please do not hesitate to contact us.