Showing 681-700 of 825 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

1 Vulnerability
Dec 29, 2022
2 Vulnerabilities
May 7, 2024
1 Vulnerability
Nov 8, 2024
3 Vulnerabilities
Jan 11, 2022
2 Vulnerabilities
Apr 23, 2021
2 Vulnerabilities
Jun 27, 2024
2 Vulnerabilities
Apr 24, 2013
1 Vulnerability
Jul 18, 2023
1 Vulnerability
Dec 9, 2022
1 Vulnerability
Aug 19, 2018
1 Vulnerability
Nov 8, 2014
3 Vulnerabilities
Jan 11, 2022
1 Vulnerability
Nov 1, 2013
1 Vulnerability
Jul 19, 2023
1 Vulnerability
Apr 15, 2024
1 Vulnerability
Apr 26, 2024
1 Vulnerability
Jul 18, 2023
Title Number of Vulnerabilities Last Vulnerability
Statfort 1 December 29, 2022
Stockholm 2 May 7, 2024
Storely 1 November 8, 2024
StoreVilla 3 January 11, 2022
Storied 2 April 23, 2021
Striking 2 June 27, 2024
Studio Zen | Photography Theme for WordPress 2 April 24, 2013
Suffice 1 July 18, 2023
Superio - Job Board 1 December 9, 2022
Superlist - Directory WordPress Theme | Directory & Listings 1 February 12, 2019
Supreme Directory 1 August 19, 2018
Swagger 1 November 8, 2014
Swape - App Showcase & App Store WordPress Theme 1 February 8, 2018
Swing Lite 3 January 11, 2022
switchblade 1 November 1, 2013
T1 Theme 1 July 19, 2023
Tainacan Interface 1 April 15, 2024
Teardrop - Fullscreen Photography Theme | Portfolio 1 June 26, 2015
Teluro 1 April 26, 2024
Temp Mail X 1 July 18, 2023

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation