vamtam.com
Scanned Apr 27, 2026, 10:13 AM
Run a fresh audit — UpgradeSecurity Assessment
Key findings for vamtam.com
- No known vulnerabilities detected in installed plugins.
- 3 plugins are outdated and should be updated.
- 35 plugins have been abandoned by the developer.
- Security headers grade D — 3 important headers are missing.
- 3 sensitive paths exposed to the public.
WordPress
Active Theme
Hosting Provider
Detected Plugins
50 total| Plugin | Vulnerabilities |
|---|---|
Elementor Website Builder – more than just a page builder high confidence | None found |
Complianz – GDPR/CCPA Cookie Consent high confidence | None found |
WPC Product Videos for WooCommerce high confidence | None found |
Gallery Carousel Without JetPack medium confidence | None found |
Slim Jetpack medium confidence | None found |
Your full security report is ready
We found 50 plugins on this site. Unlock the complete analysis:
Security Report
- Full report for this site
- Every detected plugin & CVE
- Remediation guidance
- No re-audit after fixes
Report + Re-audit
- Everything in Security Report
- One complimentary re-audit within 90 days
- Verify your fixes actually closed the findings
- Clean-record badge for your site
Guided Remediation
- Everything in Report + Re-audit
- 15–30 min expert consult to triage findings
- Prioritized action plan for your site
- Optional partner handoff for fixes
One-time payment · Instant access · No subscription required
Not ready to buy? We'll send you a one-time free alert
if we detect a new vulnerability affecting your plugins.
One free alert · Continuous monitoring available with a paid plan
Security Posture
Security Headers
50/100No Content-Security-Policy header. Your site is more vulnerable to XSS attacks.
No HSTS header. Browsers can be tricked into using insecure HTTP connections.
No clickjacking protection. Your site can be embedded in malicious iframes.
TLS/SSL Certificate
Exposed Paths & Login Security
3 exposed3 security issues found — unlock to see which paths are exposed.
DNS & Email Security
SPF record with soft fail (~all) — good email authentication.
No DMARC record found.
No DKIM record found for common selectors. Email authenticity cannot be verified (or uses a non-standard selector).
Infrastructure
Server: cloudflare
X-Powered-By header is not exposed.
Cloudflare WAF detected — provides additional protection against attacks.
WordPress version 6.9.4 is exposed in the generator meta tag. Consider removing it.