Showing 281-300 of 824 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

1 Vulnerability
Jun 6, 2024
1 Vulnerability
Feb 14, 2022
2 Vulnerabilities
Apr 25, 2023
1 Vulnerability
Aug 29, 2023
3 Vulnerabilities
Jul 18, 2023
1 Vulnerability
Sep 27, 2011
1 Vulnerability
Jun 17, 2024
1 Vulnerability
Sep 29, 2012
1 Vulnerability
Oct 29, 2012
1 Vulnerability
Apr 28, 2015
1 Vulnerability
Sep 27, 2011
1 Vulnerability
Mar 10, 2015
1 Vulnerability
Jun 17, 2012
1 Vulnerability
Jan 25, 2023
1 Vulnerability
Apr 24, 2013
1 Vulnerability
Feb 14, 2022
1 Vulnerability
Aug 29, 2024
1 Vulnerability
Apr 25, 2024
1 Vulnerability
Jun 17, 2020
Title Number of Vulnerabilities Last Vulnerability
Event 1 June 6, 2024
EventPress 1 February 14, 2022
Everest News 2 April 25, 2023
Everest News Pro 1 August 29, 2023
Everse 3 July 18, 2023
evolve 1 September 27, 2011
Excellent 1 June 17, 2024
Explicit 1 September 29, 2012
Expose 1 October 29, 2012
Exquisite - Ultimate Newspaper Theme 1 April 28, 2015
F8 Lite 1 September 27, 2011
Faction 1 March 10, 2015
Famous 1 June 17, 2012
Fascinate 1 January 25, 2023
Feather12 1 April 24, 2013
Felici - WordPress Magazine Theme | Blog / Magazine 2 March 22, 2014
Fifteen 1 February 14, 2022
Filmix 1 August 29, 2024
Financio 1 April 25, 2024
Findgo - Directory Listing WordPress Theme 1 June 17, 2020

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation