Site Information
WordPress Version: 6.4.8 ⚠️ VULNERABLE
Theme: modality (used by 321 domains)
Last Checked: 2026-04-25 17:44:48
HTTPS: ✅ Yes
Plugins (17)
| Plugin | Used By |
|---|---|
| contact-form-7 | 2,472,246 |
| gallery-images | 758 |
| master-slider | 17,172 |
| megamenu | 104,356 |
| ml-slider | 73,405 |
| page-scroll-to-id | 37,676 |
| responsive-menu | 20,191 |
| revslider | 932,724 |
| siteorigin-panels | 74,443 |
| smart-woocommerce-search | 1,610 |
| so-widgets-bundle | 39,372 |
| squirrly-seo | 4,762 |
| woo-product-slider-and-carousel-with-category | 1,833 |
| woo-sidebar-category-accordion | 444 |
| woocommerce | 1,315,678 |
| woocommerce-product-category-selection-widget | 337 |
| wp-smushit | 128,471 |
Security Headers
F
Grade F
6 missing headers
Missing Headers:
- Strict-Transport-Security (HSTS) — Forces HTTPS connections ?
- Content-Security-Policy (CSP) — Prevents XSS attacks ?
- X-Content-Type-Options — Prevents MIME sniffing ?
- X-Frame-Options — Prevents clickjacking ?
- Referrer-Policy — Controls referrer information ?
- Permissions-Policy — Limits browser features ?
Exposed Files & Configurations
This domain has publicly accessible security-sensitive files or configurations:
- Vulnerable WordPress Version (6.4.8) — CVE-2024-4439: Unauthenticated Stored XSS. Update to 6.5.2 or later immediately.
- phpinfo.php exposed — Server configuration publicly visible ?
Need help securing your WordPress site? Contact us for a professional security audit.