Showing 401-420 of 824 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

1 Vulnerability
Jul 9, 2024
1 Vulnerability
Aug 20, 2024
1 Vulnerability
May 16, 2013
1 Vulnerability
Apr 26, 2024
1 Vulnerability
Sep 29, 2012
1 Vulnerability
Feb 13, 2013
1 Vulnerability
Sep 12, 2017
1 Vulnerability
Jun 6, 2024
1 Vulnerability
Jul 18, 2023
1 Vulnerability
Sep 29, 2011
1 Vulnerability
Oct 1, 2020
1 Vulnerability
Apr 30, 2024
1 Vulnerability
Jul 9, 2024
1 Vulnerability
Jun 26, 2015
1 Vulnerability
Aug 13, 2007
1 Vulnerability
Apr 10, 2024
1 Vulnerability
Jul 12, 2024
1 Vulnerability
Jun 28, 2024
1 Vulnerability
Jun 17, 2020
Title Number of Vulnerabilities Last Vulnerability
Patricia Lite 1 July 9, 2024
Phlox PRO 1 August 20, 2024
photolio 1 May 16, 2013
Photology 1 April 26, 2024
Picture Factory 1 September 29, 2012
Pinboard 1 February 13, 2013
Pinfinity 1 September 12, 2017
Pixgraphy 1 June 6, 2024
PixiGo 1 July 18, 2023
Pixiv Custom 1 September 29, 2011
Pixova Lite 1 October 1, 2020
Pliska 1 April 30, 2024
Point 1 July 9, 2024
Pont - Multipurpose Wordpress Theme | Business 1 June 26, 2015
Pool 1 August 13, 2007
PopularFX 1 April 10, 2024
Popularis Verse 1 July 12, 2024
Preschool and Kindergarten 1 June 28, 2024
Prolisting - Directory Listing WordPress Theme 1 June 17, 2020
ProStore - Modern Magazine WordPress Theme | Blog / Magazine 1 May 7, 2014

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation