Site Information
WordPress Version: 6.9.4 ✓
Theme: avas (used by 1,744 domains)
Last Checked: 2026-04-18 15:35:36
HTTPS: ✅ Yes
Plugins (22)
| Plugin | Used By |
|---|---|
| akismet | 117,907 |
| avas-core | 1,718 |
| cf7-conditional-fields | 44,084 |
| contact-form-7 | 2,898,596 |
| duracelltomi-google-tag-manager | 127,522 |
| elementor | 3,347,658 |
| essential-addons-for-elementor-lite | 499,421 |
| essential-blocks | 45,720 |
| header-footer-elementor | 447,880 |
| mailin | 56,420 |
| megamenu | 118,734 |
| popup-maker | 155,821 |
| revslider | 1,105,981 |
| sticky-header-effects-for-elementor | 73,920 |
| translatepress-multilingual | 114,034 |
| woo-discount-rules | 28,647 |
| woo-discount-rules-pro | 12,423 |
| woo-smart-compare | 13,128 |
| woo-smart-quick-view | 17,580 |
| woo-smart-wishlist | 19,752 |
| woocommerce | 1,587,732 |
| wpcf7-redirect | 90,844 |
Security Headers
6 missing headers
Missing Headers:
- Strict-Transport-Security (HSTS) — Forces HTTPS connections ?
- Content-Security-Policy (CSP) — Prevents XSS attacks ?
- X-Content-Type-Options — Prevents MIME sniffing ?
- X-Frame-Options — Prevents clickjacking ?
- Referrer-Policy — Controls referrer information ?
- Permissions-Policy — Limits browser features ?
Exposed Files & Configurations
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.