Site Information
WordPress Version: 6.9.4 ✓
Theme: classiadspro (used by 97 domains)
Last Checked: 2026-04-30 13:44:54
HTTPS: ❌ No
Plugins (22)
| Plugin | Used By |
|---|---|
| all-in-one-seo-pack | 83,418 |
| dc-woocommerce-multi-vendor | 596 |
| designinvento-elementor-widgets | 63 |
| dicode-icons-pack | 54 |
| directorypress | 100 |
| directorypress-claim-listing | 65 |
| directorypress-frontend | 91 |
| directorypress-frontend-messages | 80 |
| elementor | 2,222,250 |
| elementor-pro | 1,261,755 |
| elkit | 76 |
| form-builder-wp | 63 |
| google-site-kit | 252,365 |
| guardian-shield | 0 |
| header-footer-builder | 69 |
| kitgenix-captcha-for-cloudflare-turnstile | 159 |
| omnisend | 15,049 |
| omnisend-connect | 6,289 |
| royal-elementor-addons | 76,967 |
| woocommerce | 1,034,404 |
| woocommerce-gateway-stripe | 94,875 |
| wpconsent-cookies-banner-privacy-suite | 9,884 |
Security Headers
6 missing headers
Missing Headers:
- Strict-Transport-Security (HSTS) — Forces HTTPS connections ?
- Content-Security-Policy (CSP) — Prevents XSS attacks ?
- X-Content-Type-Options — Prevents MIME sniffing ?
- X-Frame-Options — Prevents clickjacking ?
- Referrer-Policy — Controls referrer information ?
- Permissions-Policy — Limits browser features ?
Exposed Files & Configurations
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.