WordPress Version: Unknown
Theme: Unknown
Last Checked: 2026-03-31 08:28:05
HTTPS: ✅ Yes
Plugins (16)
| Plugin | Used By |
|---|---|
| a3-lazy-load | 42,442 |
| buy-now-pay-later-addi | 1,143 |
| elementor | 5,059,647 |
| elementor-pro | 2,779,288 |
| finale-woocommerce-sales-countdown-timer-discount | 1,811 |
| free-shipping-label | 1,662 |
| google-analytics-for-wordpress | 530,207 |
| header-footer-elementor | 688,885 |
| jet-menu | 65,614 |
| pinterest-for-woocommerce | 14,930 |
| pixelyoursite | 186,371 |
| side-cart-woocommerce | 25,547 |
| woo-advanced-product-size-chart | 3,626 |
| woocommerce | 2,474,871 |
| wp-whatsapp-chat | 91,646 |
| wpfomo | 202 |
Security Headers
6 missing headers
Missing Headers:
-
🔒
Strict-Transport-Security
Forces HTTPS connections, preventing downgrade attacks
Add header: Strict-Transport-Security: max-age=31536000; includeSubDomains -
🛡️
Content-Security-Policy
Prevents XSS attacks by controlling resource loading
Add header: Content-Security-Policy: default-src 'self' -
📄
X-Content-Type-Options
Prevents MIME type sniffing attacks
Add header: X-Content-Type-Options: nosniff -
🖼️
X-Frame-Options
Prevents clickjacking by controlling iframe embedding
Add header: X-Frame-Options: DENY -
🔗
Referrer-Policy
Controls how much referrer information is shared
Add header: Referrer-Policy: strict-origin-when-cross-origin -
⚙️
Permissions-Policy
Controls browser features like camera, microphone access
Add header: Permissions-Policy: geolocation=(), microphone=(), camera=()
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.