WordPress Plugins
Free Tools
Pricing Blog Case Studies Switch to Royal Plugin Graveyard Support My Account Cart

Free tool. No login required. 12 security checks performed.

Scanning...

Running 12 security checks...

This site doesn't appear to be running WordPress

This scanner is designed specifically for WordPress sites. Try one of our other free tools instead.

What Are the 12 WordPress Security Checks?

Each scan tests for vulnerabilities that attackers actively exploit. Here's what we check and why it matters.

1. Debug Mode Exposure

WP_DEBUG left on in production leaks file paths, database queries, and PHP errors to anyone visiting your site — giving attackers a roadmap. According to Sucuri (2025), debug data exposure contributed to 4.3% of WordPress compromises. For example, visiting yoursite.com/wp-content/debug.log on a site with WP_DEBUG_LOG enabled could expose database credentials and API keys.

2. XML-RPC Status

XML-RPC enables brute-force amplification attacks where hundreds of password guesses are sent in a single request. Wordfence blocked over 10 billion XML-RPC attacks in 2024. For example, an attacker can use XML-RPC's system.multicall method to try 500 passwords in a single request — bypassing most login rate limiters.

3. User Enumeration

If ?author=1 reveals usernames, attackers already have half the credentials they need. A 2025 Patchstack report found that user enumeration is the first step in 38% of successful WordPress brute-force attacks.

4. Directory Listing

Open directory indexes in /wp-content/uploads/ let anyone browse your files. Attackers use this to find backup files, logs, and sensitive documents.

5. Login Page Exposure

A publicly accessible wp-login.php is the primary target for brute-force attacks. Moving or restricting the login URL dramatically reduces attack surface.

6. HTTPS Redirect

Without proper HTTP→HTTPS redirect, visitors can access your site over an insecure connection, making them vulnerable to man-in-the-middle attacks.

7. WordPress Version Exposure

The generator meta tag broadcasts your exact WordPress version. Attackers cross-reference this with known CVEs to find exploits specific to your version.

8. Installation File Access

If wp-admin/install.php is accessible, an attacker could potentially reinitialize your database. This file should return a redirect or 403, never a form.

9. Readme File Exposure

readme.html reveals your exact WordPress version and installation details. It's a trivial file to remove but often overlooked during hardening.

10. WP-Cron Access

Publicly accessible wp-cron.php can be used for DDoS amplification. On high-traffic sites, replacing it with a real server cron job improves both security and performance.

11. RSD Link Exposure

The Really Simple Discovery link exposes your XML-RPC endpoint URL. Removing this meta tag reduces the information available to automated scanners.

12. REST API Access

An unrestricted REST API exposes user IDs, email addresses, and content endpoints. Restricting access to authenticated users prevents data harvesting.

"The most common WordPress hacks are entirely preventable. Basic hardening steps like disabling XML-RPC, hiding the WordPress version, and enforcing HTTPS stop the majority of automated attacks."

— Mark Maunder, CEO of Wordfence

How Critical Are These WordPress Vulnerabilities?

In our experience securing hundreds of WordPress sites with GuardPress, we've found that fixing these 12 checks eliminates over 90% of common attack vectors.

Vulnerability Risk Level % of WP Sites Affected Fix Difficulty
Debug Mode EnabledHigh8%Easy
XML-RPC EnabledMedium72%Easy
User EnumerationMedium54%Easy
Directory ListingHigh15%Easy
Exposed Login PageMedium89%Medium
No HTTPS RedirectHigh11%Easy
Version ExposureMedium61%Easy

Sources: Sucuri 2025 Threat Report, Wordfence 2025 Security Survey

Related tools: SSL Certificate Checker · HTTP Headers Checker · Hardening Checklist

Learn More About Security

Security

WordPress Malware Removal Guide

Found malware? Follow this step-by-step guide to clean and harden your site.

Security

Locked Out of WordPress? How to Recover

Four recovery methods when brute force protection locks you out.

Security

Lost Your 2FA? Recovery Guide

Phone lost, app reset. Four ways to regain access to your 2FA-protected site.

Common Questions

Yes, completely free. No registration, no email, no limits. Simply enter your WordPress site URL and get instant results with 12 security checks.

We run 12 security checks including debug mode exposure, XML-RPC status, user enumeration, directory listing, login page exposure, HTTPS redirect, WordPress version exposure, installation file access, readme file exposure, WP-Cron access, RSD link exposure, and REST API access.

No. All checks are read-only from the outside. We never log in, modify files, or make any changes to your site. The scanner only examines publicly accessible information.

Each failed check includes a specific recommendation on how to fix it. You can fix the issues manually or install a security plugin like GuardPress Pro that automates the fixes for you.

You start at 100 points. Critical issues deduct 20 points, High issues deduct 12, Medium deducts 7, Low deducts 3, and Info deducts 1. Grades are assigned as: A (90-100), B (75-89), C (60-74), D (40-59), F (0-39).