WordPress SEO

WordPress-first checks for quick technical wins

Use this page as your WordPress issue hub, then open dedicated /issues guides for deeper remediation steps.

Not on WordPress? Use the generic technical checks pathway to avoid platform-specific noise.

WordPress security visibility by plan

Free

Free includes SEO checks, crawl health, and WordPress security posture visibility.

Pro

Pro unlocks full WordPress vulnerability intelligence, weekly vulnerability monitoring, and project-level security history.

Jump to a WordPress check

WordPress footprint context

ScanForge detected common WordPress markers and enabled WordPress-focused checks in the report.

Why it matters: This is context rather than a failure, but it determines whether platform-specific checks and recommendations are applied.

First step: Treat this as platform detection context, not an urgent issue.

Open full issue page

Homepage noindex

The homepage appears to include a noindex directive that can remove your primary URL from search visibility.

Why it matters: Noindex on the homepage is usually a high-impact configuration error that can suppress branded and non-branded discovery.

First step: Confirm the noindex source in rendered HTML or response headers.

Expected outcome: Homepage returns to index eligibility.

Open full issue page

WordPress security headers incomplete

The homepage is missing or misconfiguring one or more baseline security headers.

Why it matters: Missing baseline headers increase client-side security risk and can signal avoidable hardening gaps on a high-visibility URL.

First step: Set x-content-type-options to nosniff on homepage responses.

Open full issue page

WordPress HTTPS not enforced

The homepage resolved over HTTP, indicating transport security is not consistently enforced.

Why it matters: Without enforced HTTPS, users and crawlers can hit insecure variants, increasing interception risk and weakening canonical trust signals.

First step: Force HTTP-to-HTTPS redirects at the edge or web server layer.

Open full issue page

Missing sitemap discovery

No sitemap was discovered at expected WordPress or common sitemap endpoints.

Why it matters: Without a reliable sitemap, search engines can miss important URLs or recrawl updates less efficiently.

First step: Validate XML output and response code for the canonical sitemap endpoint.

Expected outcome: Faster discovery of newly published URLs.

Open full issue page

XML-RPC reachable

The default XML-RPC endpoint is publicly reachable on the scanned WordPress site.

Why it matters: XML-RPC is sometimes needed for integrations, but open access can increase abuse surface when not required.

First step: Disable XML-RPC if no publishing workflow or integration needs it.

Open full issue page

wp-login reachable

The default WordPress login endpoint is reachable and should be hardened.

Why it matters: A reachable login path is expected, but weak controls can increase brute-force and credential stuffing risk.

First step: Enable MFA for administrator and editor accounts.

Open full issue page

Known vulnerable WordPress component detected

A publicly exposed component version matched a known vulnerable range in ScanForge's local vulnerability watch catalog.

Why it matters: Known vulnerable versions increase risk exposure and should be updated quickly even when there is no sign of active exploitation.

First step: Patch confirmed vulnerable components first by severity and exposure.

Expected outcome: Lower exploitability from known component CVEs.

Open full issue page

Possible vulnerable WordPress component

A component may match a vulnerable range, but confidence is not high enough for a confirmed finding.

Why it matters: Lower-confidence matches are signals to validate versions directly from admin metadata before deciding remediation priority.

First step: Confirm the exact installed version from WordPress admin or deployment metadata.

Open full issue page

Move from scan to conversion impact

Run a scan, resolve acquisition blockers first, and use Pro when you need weekly vulnerability and security history tracking.

Continue with the full check list in SEO checks, browse all guides in the issue library, or return to the SEO hub.