Showing 341-360 of 824 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

1 Vulnerability
Jul 2, 2020
1 Vulnerability
Mar 26, 2012
1 Vulnerability
Feb 6, 2023
1 Vulnerability
Feb 19, 2013
1 Vulnerability
Oct 4, 2011
1 Vulnerability
Jun 21, 2024
1 Vulnerability
Aug 7, 2024
1 Vulnerability
Apr 24, 2013
1 Vulnerability
Oct 14, 2024
1 Vulnerability
Oct 14, 2024
1 Vulnerability
Aug 29, 2024
1 Vulnerability
Apr 10, 2024
1 Vulnerability
Jul 13, 2015
1 Vulnerability
Oct 1, 2020
1 Vulnerability
Sep 12, 2024
1 Vulnerability
Dec 1, 2019
1 Vulnerability
Sep 27, 2011
Title Number of Vulnerabilities Last Vulnerability
Mona Lisa 1 July 2, 2020
MoneyMasters 1 March 26, 2012
Monolit 1 February 6, 2023
Montezuma 1 February 19, 2013
Morning Coffee 1 October 4, 2011
Mosaic 1 June 21, 2024
Motor – Cars, Parts, Service, Equipments and Accessories WooCommerce Store 1 June 9, 2021
MultiPurpose 1 August 7, 2024
Music 1 April 24, 2013
my flatonica 1 October 14, 2024
my wooden under construction 1 October 14, 2024
Mystique 1 August 29, 2024
Namaha 1 April 10, 2024
NativeChurch 1 July 13, 2015
NatureMag Lite 1 October 1, 2020
Neighborly 1 September 12, 2024
Neon - Bootstrap Admin Theme 1 December 1, 2019
Neosense - Multipurpose WordPress Theme | WordPress 1 September 19, 2016
Networker - Tech News WordPress Theme with Dark Mode 1 March 26, 2024
News 1 September 27, 2011

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation