Headers Security Advanced & HSTS WP
Best all-in-one WordPress security plugin, uses HTTP & HSTS response headers to avoid vulnerabilities: XSS, injection, clickjacking. Force HTTP/HTTPS.
Next Milestone 100K
Unlock Exact Install Count
See the precise estimated active installs for this plugin, calculated from real-time ranking data.
- Exact install estimates within tiers
- Track install growth over time
- Milestone progress predictions
Rank Changes
Downloads Growth
Upgrade to Pro
Unlock 30-day, 90-day, and yearly download history charts with a Pro subscription.
Upgrade NowReviews & Ratings
Tracked Keywords
Showing 5 of 5| Keyword | Position | Change | Type | Updated |
|---|---|---|---|---|
| clickjacking | 1 | — | Tag | 3 days ago |
| hsts | 1 | — | Tag | 3 days ago |
| csp | 1 | — | Tag | 3 days ago |
| headers security | 2 | — | Tag | 3 days ago |
| headers | 3 | — | Tag | 3 days ago |
Unlock Keyword Analytics
Track keyword rankings, search positions, and discover new ranking opportunities with a Pro subscription.
- Full keyword position tracking
- Historical ranking data
- Competitor keyword analysis
Support Threads Overview
Track This Plugin
Get detailed analytics, keyword tracking, and position alerts delivered to your inbox.
Start Tracking FreePlugin Details
- Version
- 5.3.2
- Last Updated
- Mar 16, 2026
- Requires WP
- 4.7+
- Tested Up To
- 6.9.4
- PHP Version
- 7.4 or higher
- Author
- Andrea Ferro
Support & Rating
- Rating
- ★ ★ ★ ★ ★ 4.9
- Reviews
- 77
- Support Threads
- 2
- Resolved
- 0%
Keywords
Upgrade to Pro
Unlock keyword rankings, search positions, and detailed analytics with a Pro subscription.
Upgrade NowSimilar Plugins
Frequently Asked Questions
Common questions about Headers Security Advanced & HSTS WP
Never use double quotes inside CSP syntax
Avoid smart quotes (curly quotes) — the plugin converts them automatically but standard quotes are recommended
The plugin validates and sanitizes CSP input to prevent .htaccess errors
What happens when Shield license expires?
Your site stays fully protected. All headers keep working. You lose Shield features (dashboard, advisor, alerts, analytics) and revert to the free version. Nothing breaks.
Can I report a bug or request a feature?
You can report bugs or request new features right support@openheaders[dot]org
What will Report URI monitor for me?
Report URI will monitor content security policy (CSP) violations and provide detailed reports on detected violations.
What will Datadog monitor for me?
Datadog will monitor content security policy (CSP) violations and other security and performance metrics of your site.
Where can I find my Datadog API Key?
You can find your Datadog API Key in the "API Keys" section under "Integrations" in the Datadog control panel. Once the plug-in is activated it performs a test (before and after): Manage CSP reporting with Datadog
What will Sentry monitor for me?
Sentry will monitor and log content security policy (CSP) violations and other JavaScript exceptions that occur on your site.
How can I configure Sentry integration with the plugin?
Log in to your Sentry dashboard.
Click on the "Projects" menu item.
Select the project you have created.
Click on the gear icon to open project settings.
In the project settings, go to the "SDK SETUP" section.
Click on "Security Headers".
Copy the automatically generated "REPORT URI" URL and paste it into the "CSP Report URI" field in the plugin settings. Example Sentry Report URI (e.g., https://<your_org>.sentry.io/api/<project_id>/security/?sentry_key=<key>).
The plugin will initialize Sentry and send CSP reports to Sentry.
Click on the "User Icon" at the top right of your screen.
Click "Settings".
Add the domains you want to monitor to the "Monitored Domains" section on the settings page.
Click on "Security Headers".
Copy the automatically generated "URIports" URL and paste it into the "CSP Report URI" field in the plugin settings. Example URIports Report URI (e.g., https://account-subdomain.uriports.com/reports).
The plugin will initialize URIports and send CSP reports to URIports.
Manage CSP reporting with URIports
Why did you choose to integrate with Sentry, URIports, Datadog, and Report URI?
I chose Sentry, URIports, Datadog, and Report URI for integration with this plugin because they are highly reputable and functional platforms in the field of security monitoring. Here's a brief overview of each:
Sentry
Sentry is a well-known platform for monitoring and tracking errors and exceptions in applications. It provides comprehensive tools for logging and analyzing JavaScript errors, making it an excellent choice for monitoring Content Security Policy (CSP) violations. By integrating with Sentry, users can benefit from detailed error reports and proactive issue resolution.
Datadog
Datadog is a powerful platform for monitoring infrastructure, applications, and logs. It offers extensive capabilities for tracking security and performance metrics, including CSP violations. The integration with Datadog allows users to gain insights into the health and security of their websites, providing real-time monitoring and alerting features that are essential for maintaining a secure and performant environment.
Report URI
Report URI is a dedicated service for collecting and analyzing security violation reports, including CSP, HPKP, and other security headers. It is designed specifically to handle large volumes of security reports and provide detailed analytics and visualizations. By using Report URI, users can easily monitor and analyze CSP violations, helping them to quickly identify and mitigate potential security threats.
Each of these platforms offers unique strengths and capabilities, making them ideal choices for comprehensive security monitoring and reporting. By integrating with these well-established services, we aim to provide users with reliable and effective tools to enhance the security of their WordPress websites.
URIports
URIports is a well-known platform for monitoring and tracking errors and exceptions in applications. It provides comprehensive tools for logging and analyzing JavaScript errors, making it an excellent choice for monitoring Content Security Policy (CSP) violations. By integrating with URIports, users can benefit from detailed error reports and proactive issue resolution.
Can I view CSP reports directly in Sentry?
Yes, all CSP reports will be sent to Sentry, where you can view and analyze them in the Sentry control panel.
How do you get an A+ grade?
To earn an A+ grade, your site must issue all HTTP response headers that we check. This indicates a high level of commitment to improving the security of your visitors.
What headers are recommended?
Over an HTTP connection we get Content-Security-Policy, X-Content-Type-Options, X-Frame-Options and X-XSS-Protection. Via an HTTPS connection, 2 additional headers are checked for presence which are Strict-Transport-Security and Public-Key-Pins.
Once the plug-in is activated it performs a test (before and after): https://securityheaders.com/
Can the plugin create slowdowns?
No, Headers Security Advanced & HSTS WP is Fast, Secure and does not affect the SEO and speed of your website.
Content Security Policy (CSP) – Best Practices
When writing your CSP directives in the plugin settings, please follow these rules to avoid invalid configurations:
1. Always use single quotes ' for CSP keywords
CSP keywords must always use straight ASCII single quotes:
'self'
'none'
'unsafe-inline'
'unsafe-eval'
'strict-dynamic'
These are required by the CSP specification.
2. Never use double quotes " inside the CSP
Double quotes are used only outside the policy (for example by Apache when setting headers), not inside the CSP syntax.
Using double quotes inside the policy may break the .htaccess configuration.
3. Do not use “smart quotes” or curly quotes (‘ ’ “ ”)
Smart quotes often appear when copying text from Word, Google Docs, PDFs, email clients, or mobile keyboards. These characters are invalid in CSP and may cause the browser to reject the policy or Apache to return HTTP 500 errors.
The plugin automatically converts smart quotes to standard quotes, but it is recommended to avoid them when writing your policy.
- Normalizes curly quotes to ASCII quotes
- Replaces invalid double quotes inside the CSP
- Prevents malformed CSP syntax from breaking .htaccess
- Falls back to the built-in default CSP if the input is clearly invalid
This ensures that even incorrect CSP input will not cause the site to crash.
What is HSTS (Strict Transport Security)?
It was created as a solution to force the browser to use secure connections when a site is running on HTTPS. It is a security header that is added to the web server and reflected in the response header as Strict-Transport-Security. HSTS is important because it addresses the following anomalies:
Check before and after using Preload HSTS
This step is important to submit your website and/or domain to an approved HSTS list. Google officially compiles this list and it is used by Chrome, Firefox, Opera, Safari, IE11 and Edge. You can forward your site to the official HSTS preload directory. ('https://hstspreload.org/')
how to use HTTP Strict Transport Security (HSTS)
If you want to use Preload HSTS for your site, there are a few requirements before you can activate it.
Have a valid SSL certificate. You can't do any of this anyway without it.
You must redirect all HTTP traffic to HTTPS (recommended via permanent 301 redirects). This means that your site should be HTTPS only.
You need to serve all subdomains in HTTPS as well. If you have subdomains, you will need an SSL certificate.
The HSTS header on your base domain (for example: example.com) is already configured you just need to activate the plug-in.
If you want to check the HSTS status of your site, you can do so here: https://hstspreload.org/
Disable FLoC, Google's advertising technology
FLoC is a mega tracker that monitors user activity on all sites, stores the information in the browser, and then uses machine learning to place users into cohorts with similar interests. This way, advertisers can target groups of people with similar interests. Plus, according to Google's own testing, FLoC achieves at least 95% more conversions than cookies.
Who is disabling FLoC by Google?
Scott Helme reported that as of May 3, already 967 of the first 1 million domains had disabled FLoC's interest-cohort in their Permissions-Policy header. That list included some big sites like The Guardian and IKEA.
Do you use CloudFlare and the Headers Security Advanced & HSTS WP plugin?
Are you experiencing any anomalies after a plugin update? If yes, please follow these instructions: clear the cache directly to the CloudFlare Client Area
Log in to your Cloudflare dashboard, and select your account and domain.
Select Caching > Configuration.
Under Cache Purge, select Custom Purge. The custom purge window will be displayed.
Under Purge by, select URL.
Enter the appropriate values in the text field using the format shown in the example.
Run through the additional instructions to complete the form.
Review the data entered.
Click Delete.
This will cause the cloudFlare