Showing 341-360 of 796 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

1 Vulnerability
Aug 29, 2024
1 Vulnerability
Apr 10, 2024
1 Vulnerability
Jul 13, 2015
1 Vulnerability
Oct 1, 2020
1 Vulnerability
Sep 12, 2024
1 Vulnerability
Dec 1, 2019
1 Vulnerability
Sep 27, 2011
1 Vulnerability
Aug 7, 2024
1 Vulnerability
Jun 28, 2024
1 Vulnerability
Jun 30, 2021
1 Vulnerability
Apr 10, 2024
1 Vulnerability
Feb 14, 2022
1 Vulnerability
Mar 4, 2022
1 Vulnerability
Mar 29, 2024
1 Vulnerability
Mar 31, 2014
1 Vulnerability
Aug 29, 2024
1 Vulnerability
Nov 3, 2021
1 Vulnerability
May 13, 2024
Title Number of Vulnerabilities Last Vulnerability
Mystique 1 August 29, 2024
Namaha 1 April 10, 2024
NativeChurch 1 July 13, 2015
NatureMag Lite 1 October 1, 2020
Neighborly 1 September 12, 2024
Neon - Bootstrap Admin Theme 1 December 1, 2019
Neosense - Multipurpose WordPress Theme | WordPress 1 September 19, 2016
Networker - Tech News WordPress Theme with Dark Mode 1 March 26, 2024
News 1 September 27, 2011
News Flash 1 August 7, 2024
NewsMash 1 June 28, 2024
Newspaper Lite 1 June 30, 2021
NewsXpress 1 April 10, 2024
NGO Charity Lite 1 February 14, 2022
NicheBase 1 March 4, 2022
Nictitate 1 March 29, 2024
nightlife 1 March 31, 2014
Nirvana 1 August 29, 2024
Nitro by WooRockets 1 November 3, 2021
Niveau 1 May 13, 2024

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation