Site Information
WordPress Version: 6.7.5 ✓
Theme: magbook (used by 598 domains)
Last Checked: 2026-05-10 04:43:17
HTTPS: ❌ No
Plugins (27)
| Plugin | Used By |
|---|---|
| ajax-login-and-registration-modal-popup | 588 |
| chaty | 36,133 |
| conditional-shipping-for-woocommerce | 2,655 |
| contact-form-7 | 1,730,218 |
| customer-reviews-woocommerce | 10,754 |
| dearpdf-lite | 1,239 |
| flexible-product-fields | 1,021 |
| image-hover-effects-ultimate-visual-composer | 411 |
| ml-slider | 66,304 |
| popup-anything-on-click | 7,346 |
| product-category-dropdowns | 116 |
| product-sticker | 0 |
| profile-builder | 8,123 |
| real-cookie-banner | 13,005 |
| sepa-payment-gateway-for-woocommerce | 11 |
| side-cart-woocommerce | 9,095 |
| simple-lightbox | 27,658 |
| to-top | 10,965 |
| video-popup | 5,447 |
| woo-advanced-discounts | 1,077 |
| woo-stickers-by-webline | 506 |
| woocommerce | 830,658 |
| woocommerce-gateway-amazon-payments-advanced | 1,823 |
| woocommerce-paypal-payments | 41,084 |
| wookstore | 24 |
| wpappninja | 700 |
| yith-woocommerce-popup | 253 |
Security Headers
6 missing headers
Missing Headers:
- Strict-Transport-Security (HSTS) — Forces HTTPS connections ?
- Content-Security-Policy (CSP) — Prevents XSS attacks ?
- X-Content-Type-Options — Prevents MIME sniffing ?
- X-Frame-Options — Prevents clickjacking ?
- Referrer-Policy — Controls referrer information ?
- Permissions-Policy — Limits browser features ?
Exposed Files & Configurations
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.