WordPress vulnerability report for

View your online scan results below.

WordPress Vulnerability Report

Your WordPress website is potentially vulnerable to attack!

Scan URL: http://www.mclabour.com.au/
Scan Date: Wed Jan 31 02:55:34 2018 (UTC+1)
WordPress Version: 4.9.2
Risk Factor: 1.2

Error

We have detected an error while scanning your website. The error was:

We found no plugins. Some possible reasons are: The website URL is incorrect. The website is not running WordPress



Please whitelist our scanner IP-address: 209.250.238.112 (scanner.wpsec.com)

Sign-up for free and view the full report

Is my site really safe?

We have a good indication that your site is safe. This means that currently your data is probably safe. It is essential that you always keep your WordPress up to date. Below we will give you more information about how to improve security and some tips to prevent future vulnerabilities. Disclaimer: Since we used automated software there could be a small chance that your site is vulnerable because we made a false negative. Also, we don't test if the passwords you use are secure so you should do that yourself. In addition, we don't provide a full overview of all vulnerabilities and we don't scan your server for server security.

What did we scan?

WPSec.com uses the advanced scanning technology of WPScanner which we combine with our own intelligent scanning algorithms. We scan for known bugs that have been indexed in our WordPress Vulnerability Database, which contains over 14000 reported vulnerabilities. Our scanner tries to identify the plugins you run and will compare their versions against the bug database. In addition, we scan for several well-known mistakes that people make when setting up their WordPress installation.

WordPress is out of date

You are running an outdated WordPress version. Please update to the latest version.

Your are running WordPress version 4.9.2. This version is an outdated version of WordPress. It is best practice to keep your WordPress installation up to date. Therefore, it is essential to update to the newest version of WordPress. Automatically update in the WordPress backend or download the newest WordPress version from the link below.

Download WordPress Update

Information Leakage

While leaking information is not a direct threat to security, it can facilitate an attacker to gain access to your systems. Therefore, it is recommended to review the following leaked info to see if it contains sensitive data.

Interesting header: KEEP-ALIVE: timeout=20

Interesting header: LINK: ; rel="https://api.w.org/"

Interesting header: LINK: ; rel=shortlink

Interesting header: SERVER: nginx

Interesting header: X-CACHE: HIT: 1

Interesting header: X-CACHE-GROUP: normal

Interesting header: X-CACHEABLE: SHORT

Interesting header: X-PASS-WHY:

Interesting header: X-TYPE: default

This site has 'Must Use Plugins' (http://codex.wordpress.org/Must_Use_Plugins)

XML-RPC Interface available under: http://www.mclabour.com.au/xmlrpc.php

Keep monitoring your WordPress for safety!

Create an account to get weekly security scans with email alerts.

Sign-up for free and view the full report

Free Sign-up