Site Information
WordPress Version: 6.9.4 ✓
Theme: porto (used by 17,078 domains)
Last Checked: 2026-04-19 18:39:43
HTTPS: ✅ Yes
Plugins (25)
| Plugin | Used By |
|---|---|
| advanced-coupons-for-woocommerce-free | 7,043 |
| advanced-flat-rate-shipping-for-woocommerce-premium | 229 |
| alpus-flexbox | 1,453 |
| cf7-conditional-fields | 37,698 |
| contact-form-7 | 2,338,317 |
| ean-for-woocommerce | 2,196 |
| elementor | 2,611,310 |
| elementor-pro | 1,466,605 |
| facebook-for-woocommerce | 13,176 |
| google-listings-and-ads | 34,768 |
| gtm-kit | 4,223 |
| iconic-woo-show-single-variations | 223 |
| interactive-3d-flipbook-powered-physics-engine | 18,134 |
| make-section-column-clickable-elementor | 1,476 |
| masks-form-fields | 1,177 |
| popup-maker | 136,647 |
| porto-functionality | 12,059 |
| recaptcha-woo | 12,598 |
| revslider | 877,000 |
| woocommerce | 1,223,609 |
| woocommerce-gateway-stripe | 107,390 |
| woocommerce-paypal-payments | 37,399 |
| woocommerce-wholesale-lead-capture | 1,012 |
| wp-rocket | 416,709 |
| yith-woocommerce-wishlist | 71,124 |
Security Headers
6 missing headers
Missing Headers:
- Strict-Transport-Security (HSTS) — Forces HTTPS connections ?
- Content-Security-Policy (CSP) — Prevents XSS attacks ?
- X-Content-Type-Options — Prevents MIME sniffing ?
- X-Frame-Options — Prevents clickjacking ?
- Referrer-Policy — Controls referrer information ?
- Permissions-Policy — Limits browser features ?
Exposed Files & Configurations
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.