How to Interpret Your FunSentry Scan Report

On This Page

You’ve just run your first scan on FunSentry. The results are in — a circular gauge, some colored counters, a list of expandable categories, and terms like “Critical,” “HSTS,” and “CVSS.”

If you’re not sure what to make of it all, you’re in the right place.

This guide walks through every element of the FunSentry report — what each section means, how the scoring works under the hood, and most importantly, which findings to fix first.


Report Layout Overview

Every FunSentry report has four distinct sections, stacked vertically:

  1. Header bar — Target URL, scan timestamp, and rescan button
  2. Score gauge + summary counters — Your overall grade at a glance
  3. Category cards — Expandable groups of related checks
  4. Individual check details — The specifics of each finding

Let’s break down each one.


Section 1: The Header Bar

At the very top of the report, you’ll see:

  • Target URL — The exact URL that was scanned, displayed as a clickable link that opens in a new tab
  • Scan timestamp — When the scan was performed (e.g., “Scanned at: 2/18/2025, 3:45:12 PM”)
  • Cached data indicator — If you’re viewing a cached result (scanned within the last 5 minutes), a small amber badge labeled “Cached Data” appears. Hover over it for details
  • Rescan button — Takes you back to the homepage to initiate a fresh scan

What Does “Cached Data” Mean?

When the same URL is scanned multiple times within 5 minutes, FunSentry serves the previous result instead of re-scanning. This protects both the target site and FunSentry’s servers. The badge simply tells you that you’re looking at a recent — but not brand-new — result. Wait 5 minutes and scan again for fresh data.


Section 2: The Score Gauge and Summary

This is the most visually prominent part of the report — a large circular SVG gauge on the left, and four summary counters on the right.

The Circular Score Gauge

The gauge displays two values:

  • Numeric score (0–100) — Your overall security score
  • Letter grade (A through F) — A quick assessment

Both the number and the grade are color-coded:

GradeScoreColorInterpretation
A90–100Green (#22c55e)Excellent. Your site follows security best practices
B70–89Blue (#3b82f6)Good. Minor issues worth addressing
C50–69Yellow (#eab308)Fair. Several security gaps need attention
D30–49Orange (#f97316)Poor. Significant vulnerabilities detected
F0–29Red (#ef4444)Critical. Immediate action required

The colored arc around the gauge fills proportionally — a score of 75 fills 75% of the circle.

The Four Summary Counters

Next to the gauge, four boxes give you an instant tally:

CounterIconColorMeaning
Passed✓ CheckmarkGreenChecks your site passed — no action needed
Warnings⚠ TriangleYellowNon-critical issues that should be reviewed
Failed✗ X markRedSecurity problems that need fixing
Infoℹ CircleBlueInformational observations — not scored

A healthy report might show something like “18 Passed, 2 Warnings, 1 Failed, 6 Info.” At a glance, you know one thing needs immediate attention.


Section 3: Category Cards

Below the summary, results are grouped into expandable category cards. FunSentry checks 15 modules organized into these categories:

CategoryWhat It CoversWeight
HTTP Security HeadersHSTS, CSP, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy, server/X-Powered-By leakage15%
Sensitive Fileswp-config backups, .env, .git/config, debug.log, phpinfo.php, SQL dumps15%
SSL/TLS CheckHTTPS availability, HTTP→HTTPS redirect, certificate validity, mixed content12%
WordPress Version DetectionCore version comparison against WordPress.org latest release10%
WordPress Config CheckDebug mode, user enumeration, login/registration page exposure, wp-cron10%
Plugins & Themes DetectionInstalled versions, WordPress.org API comparison, Wordfence vulnerability database lookup10%
Google Safe Browsing CheckWhether your domain appears on Google’s blocklist10%
XML-RPC DetectionWhether xmlrpc.php is enabled and responding to method calls8%
REST API ExposureUser enumeration endpoint, full API directory exposure8%
Directory ListingWhether wp-content, uploads, plugins, themes directories are browsable7%
Malicious Content DetectionHidden iframes, suspicious JS patterns, external redirects, hidden text5%
HTTP Response AnalysisTTFB, compression, cookie security flagsInfo only
Robots.txt AnalysisSitemap validation, suspicious URLs, full-site disallowInfo only
Server InformationIP, geolocation, hosting providerInfo only
External ResourcesThird-party scripts and iframes inventoryInfo only

How to Read a Category Card

Each card shows three pieces of information at a glance — before you even click to expand it:

Left side:

  • Arrow icon (▶ collapsed, ▼ expanded)
  • Category name (e.g., “HTTP Security Headers”)

Right side:

  • Category score — A number from 0–100, color-coded using the same scale as the overall grade
  • Status tallies — Small icons showing how many checks passed (green ✓), warned (yellow ⚠), or failed (red ✗) within that category

Auto-Expand Behavior

Categories that contain at least one failed or warning item are automatically expanded when the report loads. Categories where everything passed are collapsed by default. This means your attention is immediately drawn to the areas that need it.


Section 4: Individual Check Details

Click on a category card to expand it. Inside, you’ll see a list of individual checks. Each check is a single row with these elements:

The Check Row

From left to right:

  1. Status icon — Colored icon indicating the result:
  • ✓ Green checkmark = Pass
  • ⚠ Yellow triangle = Warning
  • ✗ Red X = Fail
  • ℹ Blue circle = Info
  • ⚠ Gray octagon = Error (check couldn’t complete)
  1. Check name — What was tested (e.g., “Strict-Transport-Security (HSTS)”)
  2. Detected value — What FunSentry actually found, shown in monospace font (e.g., the header value, the detected version number, or “Not set”)
  3. Vulnerability badge (if applicable) — A red badge showing the number of known vulnerabilities (e.g., “2 vuln”)
  4. Severity badge (for non-pass items) — Color-coded label:
SeverityColorTypical Examples
CriticalRedExposed wp-config.php backup, expired SSL certificate, known RCE vulnerability
HighOrangeXML-RPC enabled, REST API user enumeration, outdated WordPress with known CVEs
MediumYellowMissing CSP header, directory listing enabled, debug mode active
LowBlueMissing Referrer-Policy, plugin version exposed via ?ver= parameter
InfoGrayLogin page accessible, wp-cron accessible (normal behavior)
  1. Expand arrow — Click to see the full details

The Detail Panel

Click on any check row to expand its detail panel. This panel can contain up to five elements:

  1. Description — Plain-language explanation of what this check means and why it matters
  2. CVE and CVSS badges (for vulnerability findings) — If a plugin or theme has known vulnerabilities:
  • CVE badge — Clickable link to the official CVE record (e.g., “CVE-2024-1234”). Opens in a new tab
  • CVSS badge — The Common Vulnerability Scoring System score (e.g., “CVSS: 7.5”), indicating severity on a 0–10 scale
  1. Raw value box — A monospace code block showing the exact detected value, useful for developers diagnosing issues
  2. Recommendation — Specific, actionable steps to fix the issue. This is not generic advice — it’s tailored to the exact finding
  3. Reference link — An external link (usually to MDN Web Docs, WordPress.org, or a relevant security resource) for further reading

How the Scoring System Works

Understanding the math behind the score helps you know where to focus your efforts.

Step 1: Individual Check Scoring

Each check result contributes a simple value:

StatusPoints
Pass100
Warning50
Fail0
InfoNot scored
ErrorNot scored

Step 2: Category Score

The category score is the average of all scored items in that category.

Example: A category with 4 checks — 2 Pass, 1 Warning, 1 Fail:

(100 + 100 + 50 + 0) / 4 = 62.5 → rounds to 63

That category would score 63 (grade C).

Step 3: Overall Score (Weighted Average)

The overall score is a weighted average of all category scores. Not all categories carry equal weight — categories that represent higher real-world risk contribute more to your final score.

The weight distribution:

CategoryWeight
HTTP Security Headers15
Sensitive Files15
SSL/TLS12
WordPress Version10
WordPress Config10
Plugins & Themes10
Safe Browsing10
XML-RPC8
REST API8
Directory Listing7
Malicious Content5
HTTP Response Analysis0 (info-only)
Robots.txt0 (info-only)
Server Information0 (info-only)
External Resources0 (info-only)

What this means in practice: A failed sensitive file check (weight 15) impacts your score roughly twice as much as a failed directory listing check (weight 7). And info-only categories don’t affect your score at all — they’re purely informational.

Why Info-Only Categories Don’t Count

Four categories carry zero weight: HTTP Response Analysis, Robots.txt Analysis, Server Information, and External Resources. These provide useful context but don’t represent direct security vulnerabilities. For example, a slow TTFB (time to first byte) is a performance issue, not a security one.


How to Prioritize Fixes

When your report shows multiple issues, here’s how to triage them effectively.

Priority 1: Critical Severity (Fix Immediately)

These findings represent active, exploitable risks. Someone could be abusing them right now.

Common critical findings:

  • Exposed wp-config.php backup — Your database credentials are publicly readable. Delete the backup file immediately
  • Exposed .env file — API keys, secrets, and passwords are publicly accessible
  • Expired SSL certificate — Browsers are warning visitors that your site is unsafe
  • Known RCE (Remote Code Execution) vulnerability in a plugin — Attackers can execute arbitrary code on your server

Action: Stop everything else and fix these today.

Priority 2: High Severity (Fix This Week)

These are significant security gaps that could be exploited with moderate effort.

Common high findings:

  • XML-RPC enabled — Can be used for brute force attacks and DDoS amplification. Learn how to disable it
  • REST API user enumeration — Attackers can discover valid usernames
  • Outdated WordPress core with known vulnerabilities — Update from Dashboard → Updates
  • Directory listing enabled — Exposes your file structure to anyone

Action: Schedule fixes within the current week.

Priority 3: Medium Severity (Fix This Month)

These are security hardening measures. They reduce your attack surface but aren’t immediately exploitable on their own.

Common medium findings:

  • Missing Content-Security-Policy (CSP) — Increases XSS risk
  • Missing X-Frame-Options — Enables clickjacking attacks
  • Missing X-Content-Type-Options — Allows MIME-type sniffing
  • Debug mode active — PHP errors may leak internal paths

Action: Add to your monthly maintenance schedule.

Priority 4: Low Severity (Fix When Convenient)

These are best-practice recommendations that improve your overall security posture.

Common low findings:

  • Missing Permissions-Policy header — Controls browser feature access
  • Missing Referrer-Policy header — Controls referrer information leakage
  • Plugin version exposed via ?ver= parameter — Minor information disclosure

Action: Address during your next maintenance window.

Info Items: Read, Don’t Panic

Items marked as Info are observations, not problems. They don’t affect your score.

Examples:

  • “Login page accessible at /wp-login.php” — This is normal. Every WordPress site has a login page
  • “wp-cron.php accessible” — Standard WordPress behavior
  • “Server IP: 123.45.67.89” — Informational for your reference
  • “Hosting provider: Cloudflare” — Detected from server information

No action needed — but they provide useful context about your site’s footprint.


Special Report Elements

Vulnerability Badges on Plugins and Themes

When FunSentry detects a plugin or theme with known vulnerabilities, the check row displays additional elements:

  • A red vulnerability badge showing the count (e.g., “2 vuln”)
  • Inside the detail panel, clickable CVE badges linking to the official CVE database
  • A CVSS score badge showing the severity rating

For example, if Contact Form 7 version 5.8.1 has two known vulnerabilities, you’d see:

✗  Plugin: contact-form-7    v5.8.1 → v5.9.8 available    [2 vuln]    High

Expanding it would show:

  • CVE-2024-XXXX (clickable)
  • CVSS: 7.5
  • Recommendation to update to version 5.9.8

Where does the vulnerability data come from? FunSentry cross-references your detected plugin and theme versions against the Wordfence Intelligence vulnerability database, which contains over 33,000 records. This is the same database used by many professional WordPress security tools.

Version Comparison Details

For WordPress core, plugins, and themes, FunSentry shows the detected version compared to the latest available version from the WordPress.org API:

v5.8.1 → v5.9.8 available

This comparison is always live — FunSentry queries the WordPress.org API during every scan to ensure it’s comparing against the actual latest release, not a hardcoded value.


Common Report Patterns (and What They Mean)

Pattern: High Score, But With Warnings

Score: 85 (B) — 20 Passed, 4 Warnings, 0 Failed

This is a well-maintained site with some hardening gaps. The warnings are typically missing security headers like CSP, Permissions-Policy, or Referrer-Policy. These are easy to add and would push your score into the A range.

Pattern: Low Score, Mostly Headers

Score: 55 (C) — 12 Passed, 2 Warnings, 8 Failed

If most of your failures are in the “HTTP Security Headers” category, your site isn’t necessarily in danger — but your server isn’t configured with modern security headers. Many shared hosting environments don’t set these by default. A security plugin like “HTTP Headers” or server-level configuration can fix all of them at once.

Pattern: Critical Failures in Sensitive Files

Score: 40 (D) — 15 Passed, 1 Warning, 6 Failed

If you see red in the “Sensitive Files” category — especially wp-config backups, .env files, or .git directories — this is an emergency. These files contain credentials and should never be publicly accessible. Fix these before anything else.

Pattern: Plugin Vulnerabilities Driving the Score Down

Score: 60 (C) — 16 Passed, 3 Warnings, 3 Failed

If your failures are concentrated in “Plugins & Themes Detection” with vulnerability badges, the fix is straightforward: update the affected plugins. Check Dashboard → Updates in WordPress, or use a plugin management tool.


Frequently Asked Questions

Why is my score different from other security scanners?

Each scanner uses different criteria, weights, and detection methods. FunSentry’s weights are designed around real-world impact — exposed database credentials matter far more than a missing low-priority header. Your score on FunSentry, Sucuri SiteCheck, or WPScan may differ, and that’s expected.

Can I get a score of 100?

Yes, but it requires passing every scored check across all weighted categories. Most well-maintained sites score in the 80–95 range. A perfect 100 is achievable with proper header configuration, up-to-date software, and no exposed files.

Why do some categories show “100” but my overall score isn’t 100?

Because the overall score is a weighted average. If your SSL/TLS category scores 100 (weight 12) but your headers category scores 50 (weight 15), the headers drag your average down more because they carry higher weight.

What does it mean when a check shows “Error”?

An error means FunSentry couldn’t complete that specific check — usually due to a timeout or network issue. Error items are displayed with a gray icon and don’t affect your score. They’re treated the same as info items for scoring purposes.

How often should I run a scan?

We recommend at least once a month, and after any significant change to your site (new plugin installs, theme changes, hosting migrations, or WordPress core updates). Plugin vulnerabilities are disclosed regularly, so monthly scans help catch newly discovered issues.

Can I share my report with someone?

Yes. Every report has a unique URL (e.g., www.funsentry.com/report/a1b2c3d4) that you can share with your developer, hosting provider, or security consultant. Note that reports are temporary — they’re stored in server memory and are automatically purged after a short time.


Take Action

Now that you understand every element of your FunSentry report:

  1. Scan your site if you haven’t already
  2. Address critical and high items first — use the recommendations in each finding
  3. Work through medium and low items during your regular maintenance schedule
  4. Rescan after making changes to verify your fixes worked
  5. Read our related guides:

A security report is only useful if you act on it. Start with the red items, work your way down, and scan again. Your score will climb.


FunSentry is a free WordPress security scanner. No account required. No data stored. Start your scan →