Site Information
WordPress Version: 6.9.4 ✓
Theme: qushin
Last Checked: 2026-04-11 11:47:05
HTTPS: ✅ Yes
Plugins (20)
| Plugin | Used By |
|---|---|
| ajax-load-more-anything | 1,940 |
| back-in-stock-notifier-for-woocommerce | 5,654 |
| conditional-payments-for-woocommerce | 2,384 |
| conditional-shipping-for-woocommerce | 3,526 |
| countdown-wpdevart-extended | 103 |
| duracelltomi-google-tag-manager | 110,576 |
| easy-product-bundles-for-woocommerce | 1,110 |
| estimate-delivery-date-for-woocommerce-pro | 256 |
| gdpr-cookie-compliance | 81,768 |
| mailchimp-for-wp | 128,401 |
| sitepress-multilingual-cms | 251,168 |
| ti-woocommerce-wishlist | 20,117 |
| woo-discount-rules | 23,765 |
| woo-discount-rules-pro | 10,590 |
| woocommerce | 1,263,713 |
| woocommerce-abandon-cart-pro | 386 |
| woocommerce-gift-cards | 3,679 |
| woocommerce-multilingual | 34,491 |
| woocommerce-payments | 82,777 |
| wp-rocket | 425,378 |
Security Headers
6 missing headers
Missing Headers:
- Strict-Transport-Security (HSTS) — Forces HTTPS connections ?
- Content-Security-Policy (CSP) — Prevents XSS attacks ?
- X-Content-Type-Options — Prevents MIME sniffing ?
- X-Frame-Options — Prevents clickjacking ?
- Referrer-Policy — Controls referrer information ?
- Permissions-Policy — Limits browser features ?
Exposed Files & Configurations
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.