Needs Our Consulting Help
Magento Issues
Our Conductors Can Fix
Admin Panel

URLs were found that can be used to log into the backend:

A public admin login is vulnerable to exploits (like Shoplift) and brute force attacks. Rename these paths to something unguessable, use IP protection, and/or use two-factor authentication.


No exposed log files were found.

Security Patches

Not patched with SUPEE-6788.

Admin Path Disclosure, Admin Routing, Remote Code Execution, XSS

Version Control

No exposed version control files were found.

Development Files

Development files:

Development files may contain sensitive information or let attackers modify data in unexpected ways. They do not belong on a production environment.

Configuration Files

Configuration files may contain sensative informations like database users names and passwords. This shouldn’t be visible to the public.

ReviewedJuly 1, 2017
We'd love to hear about your project.
Start Now