WordPress Version: 6.9.4 ✓
Theme: thegem-elementor (used by 5,944 domains)
Last Checked: 2026-04-03 00:03:15
HTTPS: ✅ Yes
Plugins (14)
| Plugin | Used By |
|---|---|
| captcha-for-contact-form-7 | 3,036 |
| complianz-gdpr-premium | 54,035 |
| contact-form-7 | 3,580,445 |
| elementor | 4,258,956 |
| elementor-pro | 2,335,018 |
| google-listings-and-ads | 55,446 |
| google-site-kit | 438,899 |
| recaptcha-woo | 16,833 |
| thegem-elements-elementor | 4,926 |
| woocommerce | 2,035,100 |
| woocommerce-currency-switcher | 16,987 |
| woocommerce-paypal-payments | 31,772 |
| yith-woocommerce-wishlist | 125,708 |
| zilla-likes | 7,733 |
Security Headers
6 missing headers
Missing Headers:
-
🔒
Strict-Transport-Security
Forces HTTPS connections, preventing downgrade attacks
Add header: Strict-Transport-Security: max-age=31536000; includeSubDomains -
🛡️
Content-Security-Policy
Prevents XSS attacks by controlling resource loading
Add header: Content-Security-Policy: default-src 'self' -
📄
X-Content-Type-Options
Prevents MIME type sniffing attacks
Add header: X-Content-Type-Options: nosniff -
🖼️
X-Frame-Options
Prevents clickjacking by controlling iframe embedding
Add header: X-Frame-Options: DENY -
🔗
Referrer-Policy
Controls how much referrer information is shared
Add header: Referrer-Policy: strict-origin-when-cross-origin -
⚙️
Permissions-Policy
Controls browser features like camera, microphone access
Add header: Permissions-Policy: geolocation=(), microphone=(), camera=()
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.