Site Information
WordPress Version: 6.9.4 ✓
Theme: jupiterx (used by 10,471 domains)
Last Checked: 2026-04-10 05:16:56
HTTPS: ✅ Yes
Plugins (25)
| Plugin | Used By |
|---|---|
| add-to-cart-direct-checkout-for-woocommerce | 1,020 |
| advanced-product-labels-for-woocommerce | 2,459 |
| contact-form-7 | 1,755,386 |
| cookie-law-info | 218,185 |
| coupon-referral-program | 84 |
| customer-reviews-woocommerce | 10,964 |
| duracelltomi-google-tag-manager | 87,858 |
| elementor | 1,838,495 |
| facebook-for-woocommerce | 17,609 |
| jet-blog | 16,251 |
| jet-elements | 64,380 |
| jet-popup | 17,284 |
| jupiterx-core | 14,298 |
| mailchimp-for-woocommerce | 50,337 |
| mailchimp-for-wp | 86,858 |
| table-of-contents-plus | 42,268 |
| woo-variation-swatches | 33,483 |
| woocommerce | 849,183 |
| woocommerce-paypal-payments | 40,565 |
| woocommerce-product-carousel-slider-grid-ultimate-pro | 71 |
| woocommerce-product-image-flipper | 560 |
| woocommerce-products-filter | 11,995 |
| woocommerce-side-cart-premium | 2,573 |
| yith-infinite-scrolling | 1,802 |
| yith-woocommerce-wishlist | 46,423 |
Security Headers
6 missing headers
Missing Headers:
- Strict-Transport-Security (HSTS) — Forces HTTPS connections ?
- Content-Security-Policy (CSP) — Prevents XSS attacks ?
- X-Content-Type-Options — Prevents MIME sniffing ?
- X-Frame-Options — Prevents clickjacking ?
- Referrer-Policy — Controls referrer information ?
- Permissions-Policy — Limits browser features ?
Exposed Files & Configurations
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.