Showing 661-680 of 796 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

2 Vulnerabilities
Nov 23, 2016
2 Vulnerabilities
May 8, 2024
2 Vulnerabilities
Aug 29, 2024
2 Vulnerabilities
Apr 23, 2021
2 Vulnerabilities
Jul 18, 2023
2 Vulnerabilities
Mar 4, 2022
2 Vulnerabilities
Jul 4, 2024
2 Vulnerabilities
Mar 17, 2023
2 Vulnerabilities
Jul 11, 2023
2 Vulnerabilities
Mar 13, 2023
2 Vulnerabilities
Jun 3, 2024
2 Vulnerabilities
Jul 4, 2024
2 Vulnerabilities
Apr 23, 2021
2 Vulnerabilities
Apr 22, 2024
2 Vulnerabilities
Jan 1, 2013
2 Vulnerabilities
Jul 31, 2017
2 Vulnerabilities
Jan 25, 2013
2 Vulnerabilities
Sep 8, 2019
2 Vulnerabilities
Aug 29, 2024
2 Vulnerabilities
May 16, 2023
Title Number of Vulnerabilities Last Vulnerability
Platform 2 November 23, 2016
Porto 2 May 8, 2024
Posterity 2 August 29, 2024
Pressive 2 April 23, 2021
Purosa 2 July 18, 2023
Purus 2 March 4, 2022
Rara Business 2 July 4, 2024
Real Estate Directory 2 March 17, 2023
RealHomes 2 July 11, 2023
Regina Lite 2 March 13, 2023
Responsive 2 June 3, 2024
Rife Free 2 July 4, 2024
Rise 2 April 23, 2021
Royal Elementor Kit 2 April 22, 2024
Sahifa 2 January 1, 2013
Salutation Responsive WordPress Theme 2 July 31, 2017
Sandbox 2 January 25, 2013
Selio 2 September 8, 2019
Sliding Door 2 August 29, 2024
SparkleStore 2 May 16, 2023

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation