Website Security Test
Website Vulnerability Scanner
Comprehensive security testing for your website
Security Report: https://www.arkoselabs.com/
Scan Date: March 10, 2026, 8:08 a.m. | Duration: 46.11s
Have you made changes or fixed vulnerabilities?
Run a fresh scan to verify your latest security updates.
Want a deeper analysis?
This is a Light Scan result. Perform a Deep Scan to uncover hidden vulnerabilities like XSS, SQL Injection, and more.
Risk Rating
| Critical | 0 |
| High | 1 |
| Medium | 4 |
| Low | 0 |
| Critical | 0 |
| High | 3 |
| Medium | 5 |
| Low | 2 |
How is the score calculated?
Scores start at 100. Deductions are: Critical (-10), High (-5), Medium (-2), Low (-1). To ensure fairness, deductions are capped per category: Critical (40), High (25), Medium (15), Low (10).
Scan Summary
| 1 | Input Hostname | arkoselabs.com |
| 2 | Scan Start Time | March 10, 2026, 8:08 a.m. |
| 3 | Scan Duration | 46.11s |
| 4 | Total Test Cases | 50 |
Target Information
| 1 | Target URL | https://www.arkoselabs.com/ |
| 2 | IP Address | 13.35.37.69 |
| 3 | Hosting Provider | Amazon Web Services (AWS) |
| 4 | Registrar | Not Available |
| 5 | Programming Language | acorn 5.0.5 (laravel 12.16.0) |
| 6 | Web Server | nginx |
| 7 | Operating System | Linux/Unix |
| 8 | HTTPS Enabled | Enabled |
| 9 | WAF Detected | ['AWS WAF'] |
Original Header Response
Network & Infrastructure Reconnaissance
| Inline Connection | Yes |
| IP Address | 13.35.37.69 |
| Hosting Provider | Amazon Web Services (AWS) |
| Server | nginx |
| Server Disclosure CVE | No CVEs found |
| Operating System | Linux/Unix |
| Open Ports | 443, 80 |
| Database Technology | Not Detected |
| WAF Detection | ['AWS WAF'] |
| SSL Certificate | Certificate is valid |
Application Stack & Technology Fingerprinting
| CMS | {'WordPress': '3.7.8'} |
| CMS CVE |
|
| Programming Language | acorn 5.0.5 (laravel 12.16.0) |
| Technology Disclosure CVE | No CVEs found |
| Javascript Libraries | No known vulnerable libraries detected |
| Javascript Libraries CVE | Not Applicable |
| Openapi Disclosure | Not Found |
| XML RPC Endpoint Detection | Disabled |
Transport Layer Security (TLS) & Encryption
| Mixed Content Analysis | Secure |
| Secure Connection | Enabled |
| Unencrypted Viewstate | Not Detected |
HTTP Security Headers Analysis
| Securitys | X-XSS-PROTECTION, X-PERMITTED-CROSS-DOMAIN |
| Content Security Policy | Present |
| Strict Transport Security | Present |
| Referrer Policy | Present |
| X Content Type Options | Present |
| CSP Analysis | Unsafe directives detected: 'unsafe-inline' and 'unsafe-eval' Missing 'object-src' directive Missing 'frame-ancestors' directive |
| X Frame Options | Properly Configured |
| X XSS Protection | Missing x-xss-protection header |
Session & Cookie Security
| Missing HTTPonly Flag In Cookies | Missing HttpOnly flag in cookies |
| Missing Secure Flag In Cookies | Missing Secure flag in cookies |
| Loose Cookie Domain | Secure |
Sensitive Resource & File Exposure
| Directory Listing | Disabled |
| Secret Files Detection | ['https://www.arkoselabs.com/robots.txt', 'https://www.arkoselabs.com/sitemap.xml'] |
| Robots Txt File Found | None |
| Path Disclosure | Not Found |
| Htaccess Exposure | None |
Authentication & Credential Exposure
| Passwords Submitted Unencrypted | Secure |
| Password Leakage | Not Detected |
| Password Field With Autocomplete | Properly Configured |
Information Disclosure & Error Handling
| Error Messages Analysis | Secure |
| Cross Domain Inclusion | ['cdn.cookielaw.org', 'chat-application.com', 'munchkin.marketo.net', 'marketo.clearbit.com', 'www.googletagmanager.com', 'player.vimeo.com'] |
Application Surface & Method Exposure
| HTTP Methods Allowed | GET, POST, PUT, PATCH, DELETE, OPTIONS, HEAD |
| Enabled Debug Method | No |
| Enabled Options Method | Yes |
| File Upload | Not Detected |
| Client Access Policies | Not Found |
Email & Domain Security Configuration
| Email Extraction | None Found |
| SPF | v=spf1 include:mktomail.com include:_spf.google.com include:_spf.atlassian.net include:mail.zendesk.com include:mg-spf.greenhouse.io ~all |
| DMARC | v=DMARC1; p=reject; rua=mailto:postmaster@arkoselabs.com; ruf=mailto:postmaster@arkoselabs.com |
| DKIM | {'google': 'v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA8WGKNiBagT7eR/nlojcYZGw70niustmkxS68eF8UZfFIKk7yC0/J5ehV4s6M77+YuwEflfgW3mpFQ/u/mQzLrUDl2V3A9ALYKYzAG2R+LE0sLF1uNgCvuwQVGNJpnRXOXaRdtfW3qF0+/lPbI6D+9ydlKYh1rppZLrlI21I3MwfNi5EgiSJI6SmDFfmMYx5dtCZTP3joiVEc0uPdsJCkaEX1yEJrdfTSNC76fmCT+9zM4Bq8DwXUclgQvkvndfe3stQO8p3bg4SPTIVtthAPD8WpnleP6tq70xPtLhviWysyc3XL9lbs7stc//vXiN3LkQ1uuJ+ItyC6qFHN2NXvXQIDAQAB'} |
Abuse & Rate-Limiting Controls
| Rate Limit Headers | Missing Rate Limit header |
Injection & Header Manipulation
| Host Header Injection | Not Vulnerable |
Bot & Automation Protection
| Captcha Detection | Not Detected |
Other Findings
| Registrar | None |
Findings – CVE (Common Vulnerabilities and Exposures)
| Sr. No | Vulnerability Source | CVE ID | Severity | Score | Description | Remediation |
|---|---|---|---|---|---|---|
| 1 | wordpress-3.7.8 - CVE-2024-31210 | CVE-2024-31210 | High | 7.6 | WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable. | Apply latest security patches. |
| 4 | wordpress-3.7.8 - CVE-2022-3590 | CVE-2022-3590 | Medium | 5.9 | WordPress is affected by an unauthenticated blind SSRF in the pingback feature. Because of a TOCTOU race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden. | Apply latest security patches. |
| 5 | wordpress-3.7.8 - CVE-2023-22622 | CVE-2023-22622 | Medium | 5.3 | WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits. | Apply latest security patches. |
| 6 | wordpress-3.7.8 - CVE-2023-2745 | CVE-2023-2745 | Medium | 5.4 | WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack. | Apply latest security patches. |
| 7 | wordpress-3.7.8 - CVE-2022-4973 | CVE-2022-4973 | Medium | 4.9 | WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page. | Apply latest security patches. |
Findings – CWE (Common Weakness Enumeration)
| Sr. No | Vulnerability Source | CWE ID | Severity | Description | Remediation |
|---|---|---|---|---|---|
| 2 | Missing HttpOnly flag in cookies | CWE-1004 | High | Cookies accessible by JavaScript can be stolen via XSS. | Set the HttpOnly flag to prevent client-side script access. |
| 3 | Missing Secure flag in cookies | CWE-614 | High | Cookies without the Secure flag may be sent over unencrypted connections. | Enable the Secure flag for all session or sensitive cookies. |
| 8 | Missing Rate Limit header | CWE-770 | Medium | Improper control of resource consumption may enable brute-force or DoS attacks. | Implement rate limiting and add headers such as 'X-RateLimit-Limit' and 'Retry-After'. |
| 9 | Missing Header: X-XSS-PROTECTION | CWE-693 | Low | The security header X-XSS-PROTECTION is missing. | Add X-XSS-PROTECTION header to server configuration. |
| 10 | Missing Header: X-PERMITTED-CROSS-DOMAIN | CWE-693 | Low | The security header X-PERMITTED-CROSS-DOMAIN is missing. | Add X-PERMITTED-CROSS-DOMAIN header to server configuration. |
Other Security Tools
Explore our comprehensive suite of security testing tools
