New audit

acstore.fi

Scanned Apr 19, 2026, 07:30 AM

Run a fresh audit — Upgrade
87
A · Safe
50
Plugins Detected
10
Active Vulnerabilities
4
Outdated Plugins
36
Abandoned

Security Assessment

Key findings for acstore.fi

  • 10 active vulnerabilities detected across 50 plugins.
  • 4 plugins are outdated and should be updated.
  • 36 plugins have been abandoned by the developer.
  • Security headers grade F — 4 important headers are missing.
  • 5 sensitive paths exposed to the public.

WordPress

Version 6.8.5
Core installation

Active Theme

salient-old v4.7.1
Up to date

Hosting Provider

Cloudflare
Infrastructure

Detected Plugins

50 total
PluginVulnerabilities
Contact Form 7
Contact Form 7
high confidence
None found
revslider
revslider
medium confidence
+2 more
salient-core
salient-core
medium confidence
+2 more
WooCommerce
WooCommerce
medium confidence
LiteSpeed Cache
LiteSpeed Cache
medium confidence
None found
10 total vulnerabilities detected across 50 plugins

Your full security report is ready

We found 50 plugins on this site. Unlock the complete analysis:

All 50 detected plugins
CVE details & patch status
Security header analysis
Exposed paths & TLS audit
DNS & email security
CT log subdomain discovery

Security Report

one-time
$49USD
  • Full report for this site
  • Every detected plugin & CVE
  • Remediation guidance
  • No re-audit after fixes
Get Report — $49
Recommended

Report + Re-audit

best value
$99USD
  • Everything in Security Report
  • One complimentary re-audit within 90 days
  • Verify your fixes actually closed the findings
  • Clean-record badge for your site

Guided Remediation

small business
$299USD
  • Everything in Report + Re-audit
  • 15–30 min expert consult to triage findings
  • Prioritized action plan for your site
  • Optional partner handoff for fixes
Get Guided Remediation — $299

One-time payment · Instant access · No subscription required

Not ready to buy? We'll send you a one-time free alert

if we detect a new vulnerability affecting your plugins.

One free alert · Continuous monitoring available with a paid plan

Security Posture

F
Security Headers
A
TLS/SSL
F
Exposed Paths
C
Email Security

Security Headers

17/100
Content-Security-Policy

No Content-Security-Policy header. Your site is more vulnerable to XSS attacks.

Strict-Transport-Security

No HSTS header. Browsers can be tricked into using insecure HTTP connections.

X-Frame-Options

No clickjacking protection. Your site can be embedded in malicious iframes.

3 more checks — unlock full report to see all

TLS/SSL Certificate

Issuer
WE1
Expires
79 days
Protocol
TLSv1.3
Wildcard
Yes

Exposed Paths & Login Security

5 exposed

5 security issues found — unlock to see which paths are exposed.

DNS & Email Security

SPF

SPF record with soft fail (~all) — good email authentication.

DMARC

No DMARC record found.

DKIM

No DKIM record found for common selectors. Email authenticity cannot be verified (or uses a non-standard selector).

Infrastructure

Server Software

Server: cloudflare

X-Powered-By

Technology stack exposed: PHP/8.3.30, PleskLin. This header should be removed.

PHP Version

PHP 8.3.30 is supported.

Web Application Firewall

Cloudflare WAF detected — provides additional protection against attacks.

WP Version Exposed

WordPress version 6.8.5 is exposed in the generator meta tag. Consider removing it.