Site Information
WordPress Version: 6.9 ✓
Theme: wplms (used by 429 domains)
Last Checked: 2026-05-07 08:45:58
HTTPS: ✅ Yes
Plugins (22)
| Plugin | Used By |
|---|---|
| affiliate-wp | 6,482 |
| bbpress | 14,014 |
| buddypress | 6,999 |
| duracelltomi-google-tag-manager | 88,503 |
| elementor | 1,875,790 |
| elementor-pro | 1,075,083 |
| funnel-builder | 3,952 |
| jet-elements | 65,091 |
| maatos | 37 |
| maatos-analytics | 39 |
| maatos-bunny-stream | 39 |
| mollie-payments-for-woocommerce | 6,200 |
| pdf-embedder | 11,737 |
| two-factor-authentication-premium | 50 |
| vibe-course-module | 242 |
| vibe-shortcodes | 194 |
| woocommerce | 868,378 |
| woocommerce-bookings | 3,881 |
| woocommerce-bookings-availability | 231 |
| woocommerce-checkout-field-editor-pro | 289 |
| woocommerce-eu-vat-assistant | 919 |
| woocommerce-memberships | 8,491 |
Security Headers
6 missing headers
Missing Headers:
- Strict-Transport-Security (HSTS) — Forces HTTPS connections ?
- Content-Security-Policy (CSP) — Prevents XSS attacks ?
- X-Content-Type-Options — Prevents MIME sniffing ?
- X-Frame-Options — Prevents clickjacking ?
- Referrer-Policy — Controls referrer information ?
- Permissions-Policy — Limits browser features ?
Exposed Files & Configurations
✅ No Exposed Files Detected
Our automated scan did not detect any publicly-accessible sensitive files or critical misconfigurations on this domain.
However, this doesn't mean the site is completely secure. There are many other potential vulnerabilities that require deeper analysis:
- Outdated WordPress core, themes, or plugins
- Weak passwords and authentication
- SQL injection vulnerabilities
- Cross-site scripting (XSS) issues
- Insecure server configurations
Questions about your WordPress security? Reach out — we offer comprehensive security audits and can help identify hidden vulnerabilities.