Site Information
WordPress Version: Unknown
Theme: jnews (used by 8,466 domains)
Last Checked: 2026-04-20 19:46:19
HTTPS: ✅ Yes
Plugins (20)
| Plugin | Used By |
|---|---|
| better-recent-comments | 836 |
| business-directory-categories | 433 |
| constant-contact-forms | 16,959 |
| elementor | 2,764,590 |
| elementor-pro | 1,546,618 |
| essential-addons-for-elementor-lite | 415,489 |
| gn-publisher | 5,957 |
| ht-mega-for-elementor | 15,909 |
| jnews-frontend-submit | 315 |
| jnews-like | 1,425 |
| jnews-social-login | 3,637 |
| onesignal-free-web-push-notifications | 22,803 |
| paid-memberships-pro | 15,746 |
| pmpro-add-paypal-express | 613 |
| profilegrid-user-profiles-groups-and-communities | 1,275 |
| restrict-content | 430 |
| user-submitted-posts | 4,363 |
| woocommerce | 1,302,776 |
| woocommerce-gateway-stripe | 112,377 |
| wp-cloudflare-page-cache | 4,707 |
Security Headers
6 missing headers
Missing Headers:
- Strict-Transport-Security (HSTS) — Forces HTTPS connections ?
- Content-Security-Policy (CSP) — Prevents XSS attacks ?
- X-Content-Type-Options — Prevents MIME sniffing ?
- X-Frame-Options — Prevents clickjacking ?
- Referrer-Policy — Controls referrer information ?
- Permissions-Policy — Limits browser features ?
Exposed Files & Configurations
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.