WordPress Version: Unknown
Theme: kortez-travel (used by 46 domains)
Last Checked: 2026-04-03 08:18:57
HTTPS: ✅ Yes
Plugins (13)
| Plugin | Used By |
|---|---|
| contact-form-7 | 3,580,445 |
| elementor | 4,258,956 |
| elementskit-lite | 557,192 |
| essential-addons-for-elementor-lite | 631,067 |
| happy-elementor-addons | 121,968 |
| header-footer-elementor | 580,864 |
| instagram-feed | 451,387 |
| premium-addons-for-elementor | 210,762 |
| qi-addons-for-elementor | 74,030 |
| woocommerce | 2,035,100 |
| yith-woocommerce-compare | 38,032 |
| yith-woocommerce-quick-view | 25,732 |
| yith-woocommerce-wishlist | 125,708 |
Security Headers
6 missing headers
Missing Headers:
-
🔒
Strict-Transport-Security
Forces HTTPS connections, preventing downgrade attacks
Add header: Strict-Transport-Security: max-age=31536000; includeSubDomains -
🛡️
Content-Security-Policy
Prevents XSS attacks by controlling resource loading
Add header: Content-Security-Policy: default-src 'self' -
📄
X-Content-Type-Options
Prevents MIME type sniffing attacks
Add header: X-Content-Type-Options: nosniff -
🖼️
X-Frame-Options
Prevents clickjacking by controlling iframe embedding
Add header: X-Frame-Options: DENY -
🔗
Referrer-Policy
Controls how much referrer information is shared
Add header: Referrer-Policy: strict-origin-when-cross-origin -
⚙️
Permissions-Policy
Controls browser features like camera, microphone access
Add header: Permissions-Policy: geolocation=(), microphone=(), camera=()
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.