acstore.fi
Scanned Apr 19, 2026, 07:30 AM
Run a fresh audit — UpgradeSecurity Assessment
Key findings for acstore.fi
- 10 active vulnerabilities detected across 50 plugins.
- 4 plugins are outdated and should be updated.
- 36 plugins have been abandoned by the developer.
- Security headers grade F — 4 important headers are missing.
- 5 sensitive paths exposed to the public.
WordPress
Active Theme
Hosting Provider
Detected Plugins
50 total| Plugin | Vulnerabilities |
|---|---|
Contact Form 7 high confidence | None found |
revslider medium confidence | |
salient-core medium confidence | |
WooCommerce medium confidence | mediumCVE-2026-3589 mediumCVE-2025-49042 |
LiteSpeed Cache medium confidence | None found |
Your full security report is ready
We found 50 plugins on this site. Unlock the complete analysis:
Security Report
- Full report for this site
- Every detected plugin & CVE
- Remediation guidance
- No re-audit after fixes
Report + Re-audit
- Everything in Security Report
- One complimentary re-audit within 90 days
- Verify your fixes actually closed the findings
- Clean-record badge for your site
Guided Remediation
- Everything in Report + Re-audit
- 15–30 min expert consult to triage findings
- Prioritized action plan for your site
- Optional partner handoff for fixes
One-time payment · Instant access · No subscription required
Not ready to buy? We'll send you a one-time free alert
if we detect a new vulnerability affecting your plugins.
One free alert · Continuous monitoring available with a paid plan
Security Posture
Security Headers
17/100No Content-Security-Policy header. Your site is more vulnerable to XSS attacks.
No HSTS header. Browsers can be tricked into using insecure HTTP connections.
No clickjacking protection. Your site can be embedded in malicious iframes.
TLS/SSL Certificate
Exposed Paths & Login Security
5 exposed5 security issues found — unlock to see which paths are exposed.
DNS & Email Security
SPF record with soft fail (~all) — good email authentication.
No DMARC record found.
No DKIM record found for common selectors. Email authenticity cannot be verified (or uses a non-standard selector).
Infrastructure
Server: cloudflare
Technology stack exposed: PHP/8.3.30, PleskLin. This header should be removed.
PHP 8.3.30 is supported.
Cloudflare WAF detected — provides additional protection against attacks.
WordPress version 6.8.5 is exposed in the generator meta tag. Consider removing it.