Site Information
WordPress Version: 6.9.4 ✓
Theme: jnews (used by 9,452 domains)
Last Checked: 2026-04-11 07:04:19
HTTPS: ❌ No
Plugins (18)
| Plugin | Used By |
|---|---|
| add-to-any | 106,908 |
| burst-statistics | 65,061 |
| complianz-gdpr | 320,721 |
| contact-form-7 | 2,736,042 |
| elementor | 3,131,676 |
| everest-forms | 20,338 |
| gutenberg | 163,551 |
| jetpack | 509,558 |
| jnews-essential | 1,253 |
| jnews-like | 1,611 |
| jnews-pay-writer | 139 |
| jnews-paywall | 391 |
| jnews-push-notification | 454 |
| jnews-social-login | 4,146 |
| jnews-video | 761 |
| jnews-weather | 2,694 |
| ultimate-addons-for-contact-form-7 | 16,347 |
| woocommerce-payments | 68,718 |
Security Headers
6 missing headers
Missing Headers:
- Strict-Transport-Security (HSTS) — Forces HTTPS connections ?
- Content-Security-Policy (CSP) — Prevents XSS attacks ?
- X-Content-Type-Options — Prevents MIME sniffing ?
- X-Frame-Options — Prevents clickjacking ?
- Referrer-Policy — Controls referrer information ?
- Permissions-Policy — Limits browser features ?
Exposed Files & Configurations
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.