Site Information
WordPress Version: 6.9.4 ✓
Theme: jnews (used by 8,004 domains)
Last Checked: 2026-04-01 00:42:12
HTTPS: ✅ Yes
Plugins (17)
| Plugin | Used By |
|---|---|
| feedzy-rss-feeds | 14,775 |
| jnews-frontend-submit | 296 |
| jnews-like | 1,340 |
| jnews-migration-jannah | 34 |
| jnews-migration-jmagz | 32 |
| jnews-migration-newsmag | 25 |
| jnews-migration-newspaper | 61 |
| jnews-migration-publisher | 36 |
| jnews-migration-sahifa | 28 |
| jnews-migration-soledad | 19 |
| jnews-push-notification | 396 |
| jnews-social-login | 3,412 |
| js_composer | 572,245 |
| newsletter | 61,037 |
| onesignal-free-web-push-notifications | 21,622 |
| pdf-poster | 5,358 |
| revslider | 877,000 |
Security Headers
6 missing headers
Missing Headers:
- Strict-Transport-Security (HSTS) — Forces HTTPS connections ?
- Content-Security-Policy (CSP) — Prevents XSS attacks ?
- X-Content-Type-Options — Prevents MIME sniffing ?
- X-Frame-Options — Prevents clickjacking ?
- Referrer-Policy — Controls referrer information ?
- Permissions-Policy — Limits browser features ?
Exposed Files & Configurations
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.