Showing 41-60 of 688 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

1 Vulnerability
May 6, 2015
1 Vulnerability
Sep 7, 2014
1 Vulnerability
Feb 14, 2022
1 Vulnerability
Oct 8, 2012
1 Vulnerability
Feb 14, 2022
1 Vulnerability
May 15, 2015
1 Vulnerability
Jun 23, 2023
1 Vulnerability
Nov 8, 2014
1 Vulnerability
Aug 14, 2023
BBE
1 Vulnerability
May 10, 2018
1 Vulnerability
Mar 11, 2016
1 Vulnerability
Mar 5, 2023
1 Vulnerability
Jul 18, 2023
1 Vulnerability
Sep 30, 2011
1 Vulnerability
Feb 14, 2022
1 Vulnerability
Sep 29, 2012
1 Vulnerability
May 15, 2015
1 Vulnerability
Jul 18, 2007
1 Vulnerability
Jul 18, 2007
Title Number of Vulnerabilities Last Vulnerability
Auberge 1 May 6, 2015
Authentic 1 September 7, 2014
Auto Car 1 February 14, 2022
Avanix - Responsive Business WordPress Theme 1 October 8, 2012
AwpBusinessPress 1 February 14, 2022
Axioma Premium Responsive 1 May 15, 2015
Bacola - Grocery Store and Food eCommerce Theme 1 December 7, 2023
Balkon 1 June 23, 2023
Barely Corporate 1 November 8, 2014
Bazaar Lite 1 August 14, 2023
BBE 1 May 10, 2018
Beauty & Clean 1 March 11, 2016
Big Store 1 March 5, 2023
BingoPress 1 July 18, 2023
Black-Letterhead 1 September 30, 2011
Blain 1 February 14, 2022
Blaze 1 September 29, 2012
Blessing Premium Responsive WordPress Theme 1 May 15, 2015
blixed 1 July 18, 2007
BlixKrieg 1 July 18, 2007

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation