Showing 301-320 of 796 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

1 Vulnerability
Oct 1, 2020
1 Vulnerability
Oct 1, 2020
1 Vulnerability
Oct 1, 2020
1 Vulnerability
Oct 1, 2020
1 Vulnerability
Oct 1, 2020
2 Vulnerabilities
Oct 1, 2020
1 Vulnerability
Oct 1, 2020
1 Vulnerability
Oct 1, 2020
1 Vulnerability
Oct 1, 2020
1 Vulnerability
Oct 1, 2020
1 Vulnerability
Feb 6, 2021
1 Vulnerability
Apr 8, 2021
2 Vulnerabilities
Apr 23, 2021
2 Vulnerabilities
Apr 23, 2021
2 Vulnerabilities
Apr 23, 2021
2 Vulnerabilities
Apr 23, 2021
2 Vulnerabilities
Apr 23, 2021
2 Vulnerabilities
Apr 23, 2021
Title Number of Vulnerabilities Last Vulnerability
Antreas 1 October 1, 2020
Bonkers 1 October 1, 2020
Illdy 1 October 1, 2020
MedZone Lite 1 October 1, 2020
NatureMag Lite 1 October 1, 2020
Newspaper X 2 October 1, 2020
Pixova Lite 1 October 1, 2020
Shapely 1 October 1, 2020
Sparkling 1 October 1, 2020
Transcend 1 October 1, 2020
GreenMart – Organic & Food WooCommerce WordPress Theme 2 October 29, 2020
Wibar | Wine and Vineyard WooCommerce WordPress Theme 1 November 30, 2020
Wyzi - Social Directory WordPress Theme 1 February 6, 2021
WorkScout - Job Board WordPress Theme 1 April 8, 2021
FocusBlog 2 April 23, 2021
Ignition 2 April 23, 2021
Luxe 2 April 23, 2021
Minus 2 April 23, 2021
Performag 2 April 23, 2021
Pressive 2 April 23, 2021

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation