How to Read and Understand Acunetix Scan Reports

Last Tuesday, our junior developer Rajesh stared at a 42-page Acunetix PDF like it was written in ancient Sanskrit. He saw red bars, yellow warnings, and a long list of URLs. "Where do I even start?" he asked. Ten minutes later, he knew exactly which three lines of code to fix before lunch. That is the power of understanding an Acunetix report, not just receiving it. This 3000-word guide turns confusion into confidence. Whether you are a developer in Hinjawadi, a security analyst in Magarpatta, or a manager who needs to explain risk to the board, you will learn how to open a report, spot the real problems, and act fast. No PhD required. Just curiosity and a cup of chai.

Nov 6, 2025 - 16:34
Nov 7, 2025 - 11:45
 12
How to Read and Understand Acunetix Scan Reports

First 30 Seconds: The Dashboard View

Open any scan in Acunetix. The first screen is your command center.

  • Big number on top: Total vulnerabilities found.
  • Color bars: Critical (red), High (orange), Medium (yellow), Low (blue), Info (gray).
  • Scan duration: How long the engine ran.
  • Pages crawled: Confidence that nothing was missed.

Three Types of Reports

Acunetix generates three PDFs with one click:

  • Executive Report: 2 to 3 pages for managers and auditors.
  • Developer Report: Full technical details with code fixes.
  • Compliance Report: Pre-filled forms for PCI, HIPAA, GDPR.

Understanding Risk Levels

Not every issue will crash your app. Acunetix uses CVSS v3 scoring under the hood.

  • Critical (9.0 to 10.0): Remote code execution, full database dump.
  • High (7.0 to 8.9): SQL injection, authentication bypass.
  • Medium (4.0 to 6.9): XSS, CSRF, weak encryption.
  • Low (0.1 to 3.9): Missing headers, outdated library.
  • Informational: Best practices, no exploit.

1. Executive Summary Page

Page one. Perfect for your boss.

  • Risk Score: 0 to 100. Above 70 means "fix now".
  • Top 3 Risks: One-sentence plain English.
  • Compliance Status: Green check or red cross for standards.
  • Business Impact: "Customer data at risk" or "Reputation damage".

2. Risk Heatmap and Charts

Page two. Visuals that speak louder than words.

  • Heatmap: X-axis = ease of exploit, Y-axis = business impact.
  • Pie Chart: Vulnerability types (SQLi, XSS, etc.).
  • Bar Graph: Issues by severity.
  • Trend Line: Compare with last scan (improving or worsening?).

3. Vulnerability List Table

The heart of the report. A sortable table.

  • Severity: Color-coded icon.
  • Title: Short description like "SQL Injection in search.php".
  • URL: Exact endpoint affected.
  • Parameter: Which input field is vulnerable (e.g., q or id).
  • CWE: Common Weakness Enumeration number.

4. Deep Dive: One Vulnerability

Click any row. A new page opens.

  • Description: What the bug is, in simple terms.
  • Attack Scenario: Step-by-step how a hacker would use it.
  • Affected Versions: If it's a known library flaw.
  • References: OWASP, CVE link, Acunetix KB article.

5. Proof of Concept (PoC)

Proof that the bug is real, not a false alarm.

  • Request: Full HTTP request sent by Acunetix.
  • Response: What the server returned (sanitized).
  • Evidence: Highlighted part showing the leak (e.g., database error).
  • Safe PoC: Never crashes your app or deletes data.

6. How to Fix Section

The part developers love.

  • Code Before: Vulnerable PHP, Java, or Node.js snippet.
  • Code After: Secure version with prepared statements or escaping.
  • General Advice: Use input validation, CSP headers, etc.
  • Library Update: If it's a third-party component.

7. Curl Command to Reproduce

Copy-paste into terminal. See the bug live.

  • curl -X POST 'https://yoursite.com/login.php' -d 'user=admin%27--'
  • Works even on staging servers behind VPN.
  • Includes cookies if login was recorded.

8. CWE, CVE, and Standards

Links to global databases.

  • CWE-89: SQL Injection.
  • CVE-2024-XXXX: Specific library vulnerability.
  • PCI DSS 6.5.1: Requirement this issue violates.
  • Click any link to open in browser.

9. Filtering and Exporting

Don’t drown in data.

  • Filter by severity, CWE, or affected module.
  • Export to CSV, XML, or JSON for Jira import.
  • Mark as "False Positive" or "Accepted Risk" with reason.
  • Rescan single issue with one click.

10. Trend Graphs Over Time

Last page. Shows progress.

  • Line chart: Critical issues over past 10 scans.
  • Bar chart: New vs fixed vs recurring.
  • Export to PNG for monthly security report.

Sample Report Table Breakdown

Decoding One Row from the Vulnerability Table
Column Example Value What It Means Action for Dev
Severity High (orange) CVSS 8.1: attacker can steal sessions Fix today
Title Reflected XSS in search User input echoed without escaping HTML-encode output
URL /search.php?q=test Exact page and parameter Open in browser
Parameter q Input field name in HTML form Sanitize $_GET['q']
CWE CWE-79 Cross-Site Scripting Google the CWE
Status New Not seen in last scan Investigate code change

Table uses inline CSS: border: 1px solid #000; padding: 8px; on every cell + border-collapse: collapse;

Conclusion

An Acunetix report is not a wall of text. It is a roadmap. Start with the dashboard, glance at the executive summary, dive into high-severity issues, copy the curl command, apply the fix, and rescan. Do this loop every sprint, and your app will go from "vulnerable" to "fortified" in weeks. Share this guide with your team in Pune. Print the table. Bookmark the curl section. And next time Rajesh opens a report, he will smile, not panic.

What does the risk score mean?

A number from 0 to 100 based on CVSS, asset value, and exploit ease. Above 70 needs urgent action.

Why are some issues marked "Informational"?

They are best practices, not exploitable bugs. Example: missing HSTS header.

How do I know if a finding is a false positive?

Try the curl command. If it does not reproduce, mark as False in Acunetix.

Can I export only High and Critical issues?

Yes. Use the filter dropdown, then click Export > CSV.

What is CVSS?

Common Vulnerability Scoring System. Industry standard for severity.

Where is the curl command?

In the detailed view of each vulnerability, under "Request/Response".

Why does the report say "New" or "Recurring"?

Compares with your last scan. Recurring means you fixed and it came back.

Can managers understand the developer report?

No. Give them the Executive PDF. It is short and visual.

How often should we scan?

After every major release, or weekly in CI/CD pipeline.

What does "Affected Module" mean?

Which part of your app (e.g., /admin, /api/v2) has the issue.

Is the PoC safe to run in production?

Yes. Acunetix never deletes or modifies data.

How do I rescan a single issue?

Click the vulnerability, then "Rescan This Issue" button.

What are CWE numbers?

Standard codes for types of weaknesses. CWE-79 = XSS.

Can I add my company logo to the report?

Yes. Settings > Branding > Upload logo.

Why is the trend graph going down?

You fixed more issues than new ones appeared. Good job!

How do I send the report to Jira?

Export CSV, import into Jira, or use built-in integration.

What does "Business Impact" mean?

How the bug affects revenue, reputation, or compliance.

Can I schedule report emails?

Yes. Targets > Schedule > Send PDF to email list.

Where do I see scan duration?

Top of dashboard and page 1 of PDF.

How do I start reading a 50-page report?

Ignore pages. Go to dashboard, filter High+Critical, fix those first.

What's Your Reaction?

like

dislike

love

funny

angry

sad

wow

Ishwar Singh Sisodiya I am focused on making a positive difference and helping businesses and people grow. I believe in the power of hard work, continuous learning, and finding creative ways to solve problems. My goal is to lead projects that help others succeed, while always staying up to date with the latest trends. I am dedicated to creating opportunities for growth and helping others reach their full potential.