Showing 101-120 of 677 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

1 Vulnerability
Aug 10, 2023
1 Vulnerability
Jul 26, 2023
1 Vulnerability
Jul 26, 2023
1 Vulnerability
Jul 26, 2023
1 Vulnerability
Jul 19, 2023
1 Vulnerability
Jul 18, 2023
2 Vulnerabilities
Jul 18, 2023
3 Vulnerabilities
Jul 18, 2023
1 Vulnerability
Jul 18, 2023
1 Vulnerability
Jul 18, 2023
1 Vulnerability
Jul 18, 2023
1 Vulnerability
Jul 18, 2023
3 Vulnerabilities
Jul 18, 2023
1 Vulnerability
Jul 18, 2023
2 Vulnerabilities
Jul 18, 2023
1 Vulnerability
Jul 18, 2023
1 Vulnerability
Jul 18, 2023
3 Vulnerabilities
Jul 18, 2023
1 Vulnerability
Jul 18, 2023
1 Vulnerability
Jul 18, 2023
Title Number of Vulnerabilities Last Vulnerability
Business Pro 1 August 10, 2023
NSC WordPress Theme 1 July 26, 2023
Winters - WordPress Blog Theme 1 July 26, 2023
Your Journey 1 July 26, 2023
T1 Theme 1 July 19, 2023
Agncy 1 July 18, 2023
Aquarella Lite 2 July 18, 2023
Bani 3 July 18, 2023
BingoPress 1 July 18, 2023
Bootstrap Coach 1 July 18, 2023
Bootstrap Fitness 1 July 18, 2023
Bootstrap Photography 1 July 18, 2023
Brand 3 July 18, 2023
Brasserie 1 July 18, 2023
Broadcast Lite 2 July 18, 2023
Chained 1 July 18, 2023
Chic Lifestyle 1 July 18, 2023
ConsultPress Lite 3 July 18, 2023
Corporate Event 1 July 18, 2023
Cyclone Blog 1 July 18, 2023

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation