peakroad.com
Scanned Apr 19, 2026, 07:45 AM
Run a fresh audit — UpgradeSecurity Assessment
Key findings for peakroad.com
- No known vulnerabilities detected in installed plugins.
- 1 plugin is outdated and should be updated.
- 6 plugins have been abandoned by the developer.
- Security headers grade F — 4 important headers are missing.
- 1 sensitive path exposed to the public.
WordPress
Active Theme
Hosting Provider
Detected Plugins
16 total| Plugin | Vulnerabilities |
|---|---|
Contact Form 7 high confidence | None found |
Gallery Carousel Without JetPack medium confidence | None found |
Slim Jetpack medium confidence | None found |
Invisible Anti Spam for Contact Form 7 (Simple No-Bot) medium confidence | None found |
Contact Form 7 Cost Calculator (Add-on for CF7) medium confidence | None found |
Your full security report is ready
We found 16 plugins on this site. Unlock the complete analysis:
Security Report
- Full report for this site
- Every detected plugin & CVE
- Remediation guidance
- No re-audit after fixes
Report + Re-audit
- Everything in Security Report
- One complimentary re-audit within 90 days
- Verify your fixes actually closed the findings
- Clean-record badge for your site
Guided Remediation
- Everything in Report + Re-audit
- 15–30 min expert consult to triage findings
- Prioritized action plan for your site
- Optional partner handoff for fixes
One-time payment · Instant access · No subscription required
Not ready to buy? We'll send you a one-time free alert
if we detect a new vulnerability affecting your plugins.
One free alert · Continuous monitoring available with a paid plan
Security Posture
Security Headers
25/100No Content-Security-Policy header. Your site is more vulnerable to XSS attacks.
No HSTS header. Browsers can be tricked into using insecure HTTP connections.
No clickjacking protection. Your site can be embedded in malicious iframes.
TLS/SSL Certificate
Exposed Paths & Login Security
1 exposed1 security issues found — unlock to see which paths are exposed.
DNS & Email Security
SPF record with hard fail (-all) — strong email authentication.
DMARC policy is set to reject — strongest protection against email spoofing.
DKIM record found for selector "default". Email signatures can be verified.
Infrastructure
Server: LiteSpeed
X-Powered-By header is not exposed.
No WAF detected. Consider adding one for additional protection.
WordPress version 6.9.4 is exposed in the generator meta tag. Consider removing it.