HTTP to HTTPS Redirect Missing — Security and SEO Risk

Google has used HTTPS as a ranking signal since 2014, and 86.9% of websites now use HTTPS (W3Techs, 2025). If your site doesn't redirect HTTP to HTTPS, visitors land on an unencrypted connection where data can be intercepted. Search engines also treat HTTP and HTTPS as separate URLs, splitting your ranking authority between two versions of every page.

Start here

Before You Fix It: What This Check Means

HTTPS redirect coverage is what prevents users and crawlers from landing on insecure protocol variants. In plain terms, this tells you whether visitors are protected by the security setup you intend to run in production. Scavo rebuilds an HTTP version of the scanned URL and sends a HEAD probe.

Why this matters in practice: weak settings here can increase breach risk and incident blast radius before teams notice.

How to use this result: treat this as directional evidence, not final truth. A crawl snapshot cannot prove every route, subdomain, or transient edge rule is consistently configured. First, confirm the issue in live output: inspect live response headers and certificate state on the exact production host Then ship one controlled change: Enforce scheme redirect at edge or origin (single source of truth). Finally, re-scan the same URL to confirm the result improves.

TL;DR: Your site doesn't redirect HTTP traffic to HTTPS, leaving visitors on unencrypted connections and splitting your SEO authority.

Google has used HTTPS as a ranking signal since 2014, and 86.9% of websites now use HTTPS (W3Techs, 2025). If your site doesn't redirect HTTP to HTTPS, visitors land on an unencrypted connection where data can be intercepted. Search engines also treat HTTP and HTTPS as separate URLs, splitting your ranking authority between two versions of every page.

What Scavo checks (plain English)

Scavo rebuilds an HTTP version of the scanned URL and sends a HEAD probe.

How Scavo scores this check

Result behavior:

  • Pass: HTTP returns 301, 302, 307, or 308 and Location starts with https://
  • Fail: redirect exists but target is not HTTPS
  • Fail: HTTP returns 2xx (serves content over HTTP without redirect)
  • Info: Scavo could not gather enough reliable evidence on this run to score pass/fail confidently.
  • Warning: probe blocked/error or ambiguous HTTP status (4xx/unverifiable)

In your scan report, this appears under What failed / What needs attention / What is working for https_redirect, followed by Recommended next steps and Technical evidence (for developers) when needed.

  • Scan key: https_redirect
  • Category: SECURITY

Why fixing this matters

If HTTP remains accessible without upgrade, users and bots can reach insecure variants, creating mixed trust/security signals and increasing downgrade risk.

Reliable HTTPS redirects also improve canonical protocol consistency for crawlers, analytics, and cache behavior.

Common reasons this check fails

  • Redirect rules missing at edge/origin.
  • Redirect points to wrong host/protocol.
  • Partial rules only cover home page, not all paths.
  • Legacy service still serves HTTP directly.

If you are not technical

  1. Ask for proof that any http:// URL upgrades to https://.
  2. Confirm this works for deep paths, not just homepage.
  3. Ask team to document single redirect owner (CDN or origin).
  4. Re-run Scavo and confirm pass.

Technical handoff message

Copy and share this with your developer.

Scavo flagged HTTPS Redirect (https_redirect). Please enforce HTTP->HTTPS redirects for all routes, verify redirect targets are HTTPS, and share header evidence (status + Location) from production.

If you are technical

  1. Enforce scheme redirect at edge or origin (single source of truth).
  2. Preserve path/query during redirect.
  3. Prefer permanent redirect (301 or 308) unless migration constraints require otherwise.
  4. Ensure redirect does not loop and does not downgrade across host variants.
  5. Pair with HSTS once HTTPS is stable.

How to verify

  • curl -I http://your-domain/path and inspect status + Location.
  • Confirm target URL is HTTPS and path/query are preserved.
  • Test a representative set of routes.
  • Re-run Scavo and verify it passes.

What this scan cannot confirm

  • It does not validate full chain quality across all subdomains automatically.
  • It does not enforce HSTS; redirect and HSTS are complementary.
  • It does not test browser mixed-content behavior inside pages.

Owner checklist

  • [ ] Assign owner for protocol redirect policy.
  • [ ] Keep redirect rules version controlled and tested.
  • [ ] Monitor for redirect loops and accidental protocol downgrades.
  • [ ] Revalidate after load balancer/CDN changes.

FAQ

Is 302 acceptable for HTTPS redirect?

It can work, but permanent redirects (301/308) are usually better long-term for consistency.

Why is serving HTTP directly a fail?

Because users can remain on insecure protocol without forced upgrade.

Can redirect checks fail if firewalls block probes?

Yes. Scavo will return warning when verification is blocked/unreachable.

Should redirect happen at CDN or app server?

Either is fine if consistent. Avoid split logic that drifts over time.

Sources


Need a redirect validation checklist for apex/www/path/query variants? Send support your canonical host rules.

More checks in this area

cookie_security_flags

Unsafe Cookie Flags — Session Cookies Too Easy to Steal or Replay

Learn how Scavo checks live Set-Cookie headers for Secure, HttpOnly, SameSite, and prefix-rule mistakes so session and auth cookies are not left too loose.

Open guide
security_headers

Weak Security Headers — Missing or Misconfigured Browser Protections

Learn how Scavo checks critical browser security headers, including weak or invalid values, so your live responses are not giving a false sense of protection.

Open guide
content_security_policy

Content Security Policy (CSP) Missing or Too Permissive

XSS accounts for approximately 20% of reported web vulnerabilities across all industries (OWASP, 2024). A strong CSP is your primary defence — yet only 21.9% of sites have adopted CSP (HTTP Archive, 2025), and 91% of those still include unsafe-inline, making the policy ineffective. Without CSP, a single compromised third-party script or input field can steal user data, inject malware, or deface your site.

Open guide