Note: Any external scan tool can only scratch the surface of possible problems behind frontend.
Use our Magento Security Patching service for thorough check and slightest set of changes to bring all the lastest security fixes to your Magento 1.

Test is running, it may take a few minutes to get the results. The page will be refreshed automatically or you can enter your email below to receive the report when it is ready.
Unknown error has occurred. Please re-try again clicking on Scan button above in a minute or so.
Due to high number of requests your session is limited. Register or login to continue.
Unknown error has occurred. Please make sure you entered Frontend URL correctly.
Some unknown platform found. Magento 1.x or OpenMage installation not detected or probes are intersected by WAF.
Configuration issues
Cloudflare:
Magento version detected:
PHP version detected:
. Backend: Found admin backend at
Path disclosure
Magento root directory leaked:
Cacheleak:
Backupleak:
Sessionleak:
Errors dir exposure:
Downloader:
MagMI tool:
Signs of Compromise
Credit Card Hijack:
Ransomware:
Adminer:
Cryptojacking code:
Amasty Product Feed vulnerability:
Visbot malware infection:
SSL / TLS issues and PCI DSS compliance
Magento Core Patches
This patch can not be detected from outside. This line is here just to remind necessity of its installation
CVE2020-9690:
This version is vulnerable to CVE-2021-21427. Upgrade or apply security patches.
This version is vulnerable to CVE 2020-26252, CVE-2020-26285, CVE-2020-26295. Upgrade or apply security patches.
This version is vulnerable to CVE-2021-21426, CVE-2021-21427. Upgrade or apply security patches.
This version is vulnerable to CVE-2021-32758, CVE-2021-32759. Upgrade or apply security patches.
Vulnerabilities in third-party extensions
Campaigner POI vulnerability :
AW_AdvancedReports :
TBT_Rewards POI vulnerability :
BL_CustomGrid POI vulnerability :
Amasty_Acart POI vulnerability :
Amasty_Stockstatus POI vulnerability :
Amasty_Promo POI vulnerability :
Amasty_Ogrid POI vulnerability :
Magpleasure_Filesystem extension :
AW Blog SQL injection :
Congratulations! Your store appears to be safe.
Ser parcheado
Ser parcheado
Para más detalles sobre cómo aplicar parches, por favor, consulte los artículos con la etiqueta parche o use nuestro servicio de instalación de parches.