Site Information
WordPress Version: 6.8.1 ✓
Theme: hello-elementor (used by 859,858 domains)
Last Checked: 2026-04-27 06:01:20
HTTPS: ✅ Yes
Plugins (26)
| Plugin | Used By |
|---|---|
| blog-designer-pack | 8,377 |
| dzs-videogallery | 679 |
| elementor | 2,690,704 |
| elementor-pro | 1,507,291 |
| elementskit-lite | 330,048 |
| envioclick-for-woocommerce-1 | 0 |
| happy-elementor-addons | 76,453 |
| header-footer-elementor | 350,774 |
| jeg-elementor-kit | 61,425 |
| lbg_universal_video_player_addon_visual_composer | 109 |
| metform | 83,362 |
| mystickyelements | 9,060 |
| rometheme-for-elementor | 6,177 |
| romethemeform | 4,372 |
| royal-elementor-addons | 99,292 |
| skyboot-custom-icons-for-elementor | 27,778 |
| sticky-header-effects-for-elementor | 58,781 |
| sticky-social-link | 176 |
| ultimate-layouts-vc | 380 |
| whatsapp-for-wordpress | 13,105 |
| woocommerce | 1,263,713 |
| wp-file-download | 2,240 |
| wp-file-download-cloud-addon | 151 |
| yith-donations-for-woocommerce-premium | 148 |
| youtube-embed-plus | 46,505 |
| youtube-gallery-vc | 264 |
Security Headers
6 missing headers
Missing Headers:
- Strict-Transport-Security (HSTS) — Forces HTTPS connections ?
- Content-Security-Policy (CSP) — Prevents XSS attacks ?
- X-Content-Type-Options — Prevents MIME sniffing ?
- X-Frame-Options — Prevents clickjacking ?
- Referrer-Policy — Controls referrer information ?
- Permissions-Policy — Limits browser features ?
Exposed Files & Configurations
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.