Showing 541-560 of 824 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

3 Vulnerabilities
Jan 29, 2014
1 Vulnerability
May 16, 2013
1 Vulnerability
Apr 26, 2024
1 Vulnerability
Sep 29, 2012
1 Vulnerability
Feb 13, 2013
1 Vulnerability
Sep 12, 2017
1 Vulnerability
Jun 6, 2024
1 Vulnerability
Jul 18, 2023
1 Vulnerability
Sep 29, 2011
1 Vulnerability
Oct 1, 2020
2 Vulnerabilities
Nov 23, 2016
1 Vulnerability
Apr 30, 2024
1 Vulnerability
Jul 9, 2024
1 Vulnerability
Jun 26, 2015
1 Vulnerability
Aug 13, 2007
1 Vulnerability
Apr 10, 2024
1 Vulnerability
Jul 12, 2024
2 Vulnerabilities
May 8, 2024
2 Vulnerabilities
Aug 29, 2024
1 Vulnerability
Jun 28, 2024
Title Number of Vulnerabilities Last Vulnerability
Photocrati 3 January 29, 2014
photolio 1 May 16, 2013
Photology 1 April 26, 2024
Picture Factory 1 September 29, 2012
Pinboard 1 February 13, 2013
Pinfinity 1 September 12, 2017
Pixgraphy 1 June 6, 2024
PixiGo 1 July 18, 2023
Pixiv Custom 1 September 29, 2011
Pixova Lite 1 October 1, 2020
Platform 2 November 23, 2016
Pliska 1 April 30, 2024
Point 1 July 9, 2024
Pont - Multipurpose Wordpress Theme | Business 1 June 26, 2015
Pool 1 August 13, 2007
PopularFX 1 April 10, 2024
Popularis Verse 1 July 12, 2024
Porto 2 May 8, 2024
Posterity 2 August 29, 2024
Preschool and Kindergarten 1 June 28, 2024

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation