Home About Services Tools Pricing Blog Contact Career Login Get Started
Security Test

Website Security Test

Website Vulnerability Scanner

Comprehensive security testing for your website

Disclaimer: Deep scans perform intrusive tests. Ensure you have explicit authorization to scan the target domain. Unauthorized scanning may be illegal.

You have 1 free guest scans left.

Security Report: https://www.arkoselabs.com/

Scan Date: March 10, 2026, 8:08 a.m. | Duration: 46.11s

Light Scan Result

Have you made changes or fixed vulnerabilities?

Run a fresh scan to verify your latest security updates.

Want a deeper analysis?

This is a Light Scan result. Perform a Deep Scan to uncover hidden vulnerabilities like XSS, SQL Injection, and more.

Includes intrusive tests. Ensure you are authorized.

Risk Rating

Overall Risk Rating B (73/100)
5
Total CVEs
10
Total CWEs
Risk Distribution Chart
CVE Based Risk Distribution
Critical 0
High 1
Medium 4
Low 0
CWE Based Risk Distribution
Critical 0
High 3
Medium 5
Low 2
Unique CVE IDs Identified
CVE-2022-3590, CVE-2022-4973, CVE-2023-22622, CVE-2023-2745, CVE-2024-31210
Unique CWE IDs Identified
CWE-1004, CWE-22, CWE-367, CWE-434, CWE-614, CWE-693, CWE-770, CWE-79, NVD-CWE-Other

How is the score calculated?

Scores start at 100. Deductions are: Critical (-10), High (-5), Medium (-2), Low (-1). To ensure fairness, deductions are capped per category: Critical (40), High (25), Medium (15), Low (10).

Scan Summary

1 Input Hostname arkoselabs.com
2 Scan Start Time March 10, 2026, 8:08 a.m.
3 Scan Duration 46.11s
4 Total Test Cases 50

Target Information

1 Target URL https://www.arkoselabs.com/
2 IP Address 13.35.37.69
3 Hosting Provider Amazon Web Services (AWS)
4 Registrar Not Available
5 Programming Language acorn 5.0.5 (laravel 12.16.0)
6 Web Server nginx
7 Operating System Linux/Unix
8 HTTPS Enabled Enabled
9 WAF Detected ['AWS WAF']

Original Header Response

Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Server: nginx
Date: Tue, 10 Mar 2026 02:37:53 GMT
Content-Encoding: br
X-Cache-Group: normal
Cache-Control: max-age=600, must-revalidate
Content-Security-Policy: default-src 'self' 'unsafe-inline' 'unsafe-eval' https: data: blob:
Cross-Origin-Resource-Policy: cross-origin
Link: <https://www.arkoselabs.com/wp-json/>; rel="https://api.w.org/", <https://www.arkoselabs.com/wp-json/wp/v2/pages/32448>; rel="alternate"; title="JSON"; type="application/json", <https://www.arkoselabs.com/>; rel=shortlink
Permissions-Policy: accelerometer=(), ambient-light-sensor=(), autoplay=(self "https://www.youtube.com" "https://player.vimeo.com"), battery=(), browsing-topics=(), camera=(), cross-origin-isolated=(), display-capture=(), document-domain=(), encrypted-media=(), execution-while-not-rendered=(), execution-while-out-of-viewport=(), fullscreen=(self "https://www.youtube.com" "https://player.vimeo.com"), geolocation=(), gyroscope=(), keyboard-map=(), magnetometer=(), microphone=(), midi=(), navigation-override=(), payment=(), picture-in-picture=(self "https://www.youtube.com" "https://player.vimeo.com"), publickey-credentials-get=(), screen-wake-lock=(), sync-xhr=(), usb=(), web-share=(), xr-spatial-tracking=()
Referrer-Policy: origin-when-cross-origin
Strict-Transport-Security: max-age=31536000;
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Powered-By: Acorn 5.0.5 (Laravel 12.16.0)
X-Cacheable: SHORT
Vary: Accept-Encoding,Accept-Encoding,Accept-Encoding,Accept-Encoding,Cookie
X-Cache: Hit from cloudfront
Via: 1.1 fae368099713718ce5bc8ad14b40153c.cloudfront.net (CloudFront)
X-Amz-Cf-Pop: PNQ50-P3
Alt-Svc: h3=":443"; ma=86400
X-Amz-Cf-Id: cpPFgtZ08djXkV8gULA5_qVJnBW25q43s6h58HNo-XhZzLGw81AofA==
Age: 60

Network & Infrastructure Reconnaissance

Inline Connection Yes
IP Address 13.35.37.69
Hosting Provider Amazon Web Services (AWS)
Server nginx
Server Disclosure CVE No CVEs found
Operating System Linux/Unix
Open Ports 443, 80
Database Technology Not Detected
WAF Detection ['AWS WAF']
SSL Certificate Certificate is valid

Application Stack & Technology Fingerprinting

CMS {'WordPress': '3.7.8'}
CMS CVE
Vulnerable Asset
wordpress-3.7.8
CVE-2022-3590 CWE-367
CVSS v3
5.9
MEDIUM
WordPress is affected by an unauthenticated blind SSRF in the pingback feature. Because of a TOCTOU race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden.
Published: 2022-12-14T09:15:09
CVE-2023-22622 NVD-CWE-Other
CVSS v3
5.3
MEDIUM
WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits.
Published: 2023-01-05T02:15:07
CVE-2023-2745 CWE-22
CVSS v3
5.4
MEDIUM
WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
Published: 2023-05-17T09:15:10
CVE-2024-31210 CWE-434
CVSS v3
7.6
HIGH
WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.
Published: 2024-04-04T23:15:16
CVE-2022-4973 CWE-79
CVSS v3
4.9
MEDIUM
WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.
Published: 2024-10-16T07:15:12
Programming Language acorn 5.0.5 (laravel 12.16.0)
Technology Disclosure CVE No CVEs found
Javascript Libraries No known vulnerable libraries detected
Javascript Libraries CVE Not Applicable
Openapi Disclosure Not Found
XML RPC Endpoint Detection Disabled

Transport Layer Security (TLS) & Encryption

Mixed Content Analysis Secure
Secure Connection Enabled
Unencrypted Viewstate Not Detected

HTTP Security Headers Analysis

Securitys X-XSS-PROTECTION, X-PERMITTED-CROSS-DOMAIN
Content Security Policy Present
Strict Transport Security Present
Referrer Policy Present
X Content Type Options Present
CSP Analysis Unsafe directives detected: 'unsafe-inline' and 'unsafe-eval' Missing 'object-src' directive Missing 'frame-ancestors' directive
X Frame Options Properly Configured
X XSS Protection Missing x-xss-protection header

Session & Cookie Security

Missing HTTPonly Flag In Cookies Missing HttpOnly flag in cookies
Missing Secure Flag In Cookies Missing Secure flag in cookies
Loose Cookie Domain Secure

Sensitive Resource & File Exposure

Directory Listing Disabled
Secret Files Detection ['https://www.arkoselabs.com/robots.txt', 'https://www.arkoselabs.com/sitemap.xml']
Robots Txt File Found None
Path Disclosure Not Found
Htaccess Exposure None

Authentication & Credential Exposure

Passwords Submitted Unencrypted Secure
Password Leakage Not Detected
Password Field With Autocomplete Properly Configured

Information Disclosure & Error Handling

Error Messages Analysis Secure
Cross Domain Inclusion ['cdn.cookielaw.org', 'chat-application.com', 'munchkin.marketo.net', 'marketo.clearbit.com', 'www.googletagmanager.com', 'player.vimeo.com']

Application Surface & Method Exposure

HTTP Methods Allowed GET, POST, PUT, PATCH, DELETE, OPTIONS, HEAD
Enabled Debug Method No
Enabled Options Method Yes
File Upload Not Detected
Client Access Policies Not Found

Email & Domain Security Configuration

Email Extraction None Found
SPF v=spf1 include:mktomail.com include:_spf.google.com include:_spf.atlassian.net include:mail.zendesk.com include:mg-spf.greenhouse.io ~all
DMARC v=DMARC1; p=reject; rua=mailto:postmaster@arkoselabs.com; ruf=mailto:postmaster@arkoselabs.com
DKIM {'google': 'v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA8WGKNiBagT7eR/nlojcYZGw70niustmkxS68eF8UZfFIKk7yC0/J5ehV4s6M77+YuwEflfgW3mpFQ/u/mQzLrUDl2V3A9ALYKYzAG2R+LE0sLF1uNgCvuwQVGNJpnRXOXaRdtfW3qF0+/lPbI6D+9ydlKYh1rppZLrlI21I3MwfNi5EgiSJI6SmDFfmMYx5dtCZTP3joiVEc0uPdsJCkaEX1yEJrdfTSNC76fmCT+9zM4Bq8DwXUclgQvkvndfe3stQO8p3bg4SPTIVtthAPD8WpnleP6tq70xPtLhviWysyc3XL9lbs7stc//vXiN3LkQ1uuJ+ItyC6qFHN2NXvXQIDAQAB'}

Abuse & Rate-Limiting Controls

Rate Limit Headers Missing Rate Limit header

Injection & Header Manipulation

Host Header Injection Not Vulnerable

Bot & Automation Protection

Captcha Detection Not Detected

Other Findings

Registrar None

Findings – CVE (Common Vulnerabilities and Exposures)

Sr. No Vulnerability Source CVE ID Severity Score Description Remediation
1 wordpress-3.7.8 - CVE-2024-31210 CVE-2024-31210 High 7.6 WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable. Apply latest security patches.
4 wordpress-3.7.8 - CVE-2022-3590 CVE-2022-3590 Medium 5.9 WordPress is affected by an unauthenticated blind SSRF in the pingback feature. Because of a TOCTOU race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden. Apply latest security patches.
5 wordpress-3.7.8 - CVE-2023-22622 CVE-2023-22622 Medium 5.3 WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits. Apply latest security patches.
6 wordpress-3.7.8 - CVE-2023-2745 CVE-2023-2745 Medium 5.4 WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack. Apply latest security patches.
7 wordpress-3.7.8 - CVE-2022-4973 CVE-2022-4973 Medium 4.9 WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page. Apply latest security patches.

Findings – CWE (Common Weakness Enumeration)

Sr. No Vulnerability Source CWE ID Severity Description Remediation
2 Missing HttpOnly flag in cookies CWE-1004 High Cookies accessible by JavaScript can be stolen via XSS. Set the HttpOnly flag to prevent client-side script access.
3 Missing Secure flag in cookies CWE-614 High Cookies without the Secure flag may be sent over unencrypted connections. Enable the Secure flag for all session or sensitive cookies.
8 Missing Rate Limit header CWE-770 Medium Improper control of resource consumption may enable brute-force or DoS attacks. Implement rate limiting and add headers such as 'X-RateLimit-Limit' and 'Retry-After'.
9 Missing Header: X-XSS-PROTECTION CWE-693 Low The security header X-XSS-PROTECTION is missing. Add X-XSS-PROTECTION header to server configuration.
10 Missing Header: X-PERMITTED-CROSS-DOMAIN CWE-693 Low The security header X-PERMITTED-CROSS-DOMAIN is missing. Add X-PERMITTED-CROSS-DOMAIN header to server configuration.

Other Security Tools

Explore our comprehensive suite of security testing tools

Web Scanners

Malicious IP Test

Run Test
Web Scanners

Wordpress Test

Run Test
Web Scanners

Security Headers Test

Run Test
Web Scanners

Reconnaissance

Run Test
Web Scanners

SSL Security Test

Run Test
Web Scanners

Malicious URL Test

Run Test