Site Information
WordPress Version: 6.9.4 ✓
Theme: porto (used by 21,703 domains)
Last Checked: 2026-04-08 03:45:06
HTTPS: ✅ Yes
Plugins (22)
| Plugin | Used By |
|---|---|
| advanced-woo-search | 17,607 |
| ajax-search-for-woocommerce | 37,969 |
| blog-designer-pack | 10,177 |
| cleantalk-spam-protect | 123,650 |
| contact-form-7 | 2,898,596 |
| content-control | 9,430 |
| debug-log-manager | 1,527 |
| invoice-payment-gateway-option | 10 |
| js_composer | 702,399 |
| mgwoocommercebrands | 236 |
| minmax-quantity-for-woocommerce | 4,921 |
| newsletter | 75,310 |
| popup-notices-for-woocommerce | 497 |
| porto-functionality | 14,898 |
| smart-slider-3 | 127,131 |
| Ultimate_VC_Addons | 87,241 |
| user-registration-plugin-for-woocommerce | 1,277 |
| wish-list-for-woocommerce | 647 |
| woo-customers-order-history | 261 |
| woo-save-abandoned-carts | 2,698 |
| woocommerce | 1,587,732 |
| wpgsi | 607 |
Security Headers
6 missing headers
Missing Headers:
- Strict-Transport-Security (HSTS) — Forces HTTPS connections ?
- Content-Security-Policy (CSP) — Prevents XSS attacks ?
- X-Content-Type-Options — Prevents MIME sniffing ?
- X-Frame-Options — Prevents clickjacking ?
- Referrer-Policy — Controls referrer information ?
- Permissions-Policy — Limits browser features ?
Exposed Files & Configurations
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.