Showing 621-640 of 796 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

2 Vulnerabilities
Dec 17, 2013
2 Vulnerabilities
May 30, 2023
2 Vulnerabilities
Jul 22, 2024
2 Vulnerabilities
Jun 18, 2024
2 Vulnerabilities
Apr 23, 2021
2 Vulnerabilities
Dec 17, 2013
2 Vulnerabilities
Jun 14, 2021
2 Vulnerabilities
May 16, 2023
2 Vulnerabilities
May 16, 2023
2 Vulnerabilities
Jul 18, 2023
2 Vulnerabilities
Sep 9, 2020
2 Vulnerabilities
Apr 23, 2021
2 Vulnerabilities
Dec 7, 2023
2 Vulnerabilities
Jun 19, 2024
2 Vulnerabilities
May 16, 2023
2 Vulnerabilities
Mar 16, 2023
2 Vulnerabilities
Jul 18, 2023
Title Number of Vulnerabilities Last Vulnerability
Fusion 2 December 17, 2013
GreenMart – Organic & Food WooCommerce WordPress Theme 2 October 29, 2020
HashOne 2 May 30, 2023
Himalayas 2 July 22, 2024
Hueman 2 June 18, 2024
Ignition 2 April 23, 2021
InFocus 2 December 17, 2013
InJob | Multi features for recruitment WordPress Theme 2 July 2, 2020
Jannah - Newspaper Magazine News BuddyPress AMP 2 June 14, 2021
Kathmag 2 May 16, 2023
Kingcabs 2 May 16, 2023
LearnMore 2 July 18, 2023
Listeo - Directory & Listings With Booking - WordPress Theme 2 May 16, 2021
Love Travel 2 September 9, 2020
Luxe 2 April 23, 2021
Machic - Electronics Store WooCommerce Theme 2 December 7, 2023
Materialis 2 June 19, 2024
Medical Heed 2 May 16, 2023
Mediciti Lite 2 March 16, 2023
Meridia 2 July 18, 2023

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation