Site Information
WordPress Version: 6.8.3 ✓
Theme: flone (used by 45 domains)
Last Checked: 2026-04-09 05:36:12
HTTPS: ✅ Yes
Plugins (22)
| Plugin | Used By |
|---|---|
| contact-form-7 | 2,453,286 |
| cookie-law-info | 292,640 |
| easy-digital-downloads | 11,480 |
| elementor | 2,764,590 |
| flone-core | 45 |
| hashbar-wp-notification-bar | 2,092 |
| ht-slider-for-elementor | 4,613 |
| instagram-feed | 313,261 |
| jetpack | 497,653 |
| LayerSlider | 128,843 |
| mailchimp-for-woocommerce | 73,710 |
| mailchimp-for-wp | 132,227 |
| prdctfltr | 3,017 |
| slider-revolution | 4,196 |
| wc-multi-currency | 259 |
| woo-variation-swatches | 53,953 |
| woocommerce | 1,302,776 |
| woocommerce-smart-coupons | 4,538 |
| woolentor-addons | 16,582 |
| yith-woocommerce-compare | 22,314 |
| yith-woocommerce-quick-view | 15,684 |
| yith-woocommerce-wishlist | 76,615 |
Security Headers
6 missing headers
Missing Headers:
- Strict-Transport-Security (HSTS) — Forces HTTPS connections ?
- Content-Security-Policy (CSP) — Prevents XSS attacks ?
- X-Content-Type-Options — Prevents MIME sniffing ?
- X-Frame-Options — Prevents clickjacking ?
- Referrer-Policy — Controls referrer information ?
- Permissions-Policy — Limits browser features ?
Exposed Files & Configurations
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.