New audit

blogvault.net

Scanned May 19, 2026, 07:44 AM

Run a fresh audit — Upgrade
94
A · Safe
5
Plugins Detected
5
Active Vulnerabilities
1
Outdated Plugins
1
Abandoned

Security Assessment

Key findings for blogvault.net

  • 5 active vulnerabilities detected across 5 plugins.
  • 1 plugin is outdated and should be updated.
  • 1 plugin has been abandoned by the developer.
  • 3 sensitive paths exposed to the public.

WordPress

Version 6.8.3
Core installation

Active Theme

Kadence v1.2.26
Outdated

Hosting Provider

Unknown
Infrastructure

Detected Plugins

5 total
PluginVulnerabilities
+3 more
Star Rating Block
Star Rating Block
high confidence
None found
None found
kadence-conversions
kadence-conversions
medium confidence
None found
kadence-pro
kadence-pro
medium confidence
None found

Unlock the full security analysis

Get the full breakdown of your site's security posture:

All 5 detected plugins
CVE details & patch status
Security header analysis
Exposed paths & TLS audit
DNS & email security
CT log subdomain discovery

Security Report

one-time
$49USD
  • Full report for this site
  • Every detected plugin & CVE
  • Remediation guidance
  • No re-audit after fixes
Get Report — $49
Recommended

Report + Re-audit

best value
$99USD
  • Everything in Security Report
  • One complimentary re-audit within 90 days
  • Verify your fixes actually closed the findings
  • Clean-record badge for your site

Guided Remediation

small business
$299USD
  • Everything in Report + Re-audit
  • 15–30 min expert consult to triage findings
  • Prioritized action plan for your site
  • Optional partner handoff for fixes
Get Guided Remediation — $299

One-time payment · Instant access · No subscription required

Not ready to buy? We'll send you a one-time free alert

if we detect a new vulnerability affecting your plugins.

One free alert · Continuous monitoring available with a paid plan

Security Posture

B
Security Headers
B
TLS/SSL
F
Exposed Paths
B
Email Security

Security Headers

86/100
Content-Security-Policy

No Content-Security-Policy header. Your site is more vulnerable to XSS attacks.

Strict-Transport-Security

HSTS is enabled. Consider adding includeSubDomains for better protection.

X-Frame-Options

Clickjacking protection is enabled.

4 more checks — unlock full report to see all

TLS/SSL Certificate

Issuer
R12
Expires
42 days
Protocol
TLSv1.3
Wildcard
No

Exposed Paths & Login Security

3 exposed

3 security issues found — unlock to see which paths are exposed.

DNS & Email Security

SPF

SPF record with hard fail (-all) — strong email authentication.

DMARC

DMARC policy is set to none — monitoring only, not enforcing.

DKIM

DKIM record found for selector "google". Email signatures can be verified.

Certificate Transparency

548 certificates found · 16 subdomains discovered

Infrastructure

Server Software

Server: nginx

X-Powered-By

X-Powered-By header is not exposed.

Web Application Firewall

No WAF detected. Consider adding one for additional protection.

WP Version Exposed

WordPress version 6.8.3 is exposed in the generator meta tag. Consider removing it.