Showing 741-760 of 791 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

1 Vulnerability
Jul 10, 2024
1 Vulnerability
Jul 11, 2024
2 Vulnerabilities
Jul 11, 2024
1 Vulnerability
Jul 11, 2024
1 Vulnerability
Jul 12, 2024
1 Vulnerability
Jul 12, 2024
1 Vulnerability
Jul 12, 2024
1 Vulnerability
Jul 17, 2024
1 Vulnerability
Jul 19, 2024
2 Vulnerabilities
Jul 22, 2024
9 Vulnerabilities
Jul 22, 2024
1 Vulnerability
Aug 7, 2024
1 Vulnerability
Aug 7, 2024
3 Vulnerabilities
Aug 7, 2024
1 Vulnerability
Aug 7, 2024
1 Vulnerability
Aug 7, 2024
MDx
1 Vulnerability
Aug 9, 2024
2 Vulnerabilities
Aug 12, 2024
4 Vulnerabilities
Aug 12, 2024
Title Number of Vulnerabilities Last Vulnerability
Responsive Mobile 1 July 10, 2024
i-amaze 1 July 11, 2024
OnePress 2 July 11, 2024
Patricia Blog 1 July 11, 2024
i-transform 1 July 12, 2024
Oceanic 1 July 12, 2024
Popularis Verse 1 July 12, 2024
Himer - Social Questions and Answers WordPress Theme 7 July 15, 2024
Zenon Lite 1 July 17, 2024
CoziPress 1 July 19, 2024
Himalayas 2 July 22, 2024
ListingPro - WordPress Directory & Listing Theme 9 July 22, 2024
Orchid Store 1 August 7, 2024
The Next 1 August 7, 2024
Woffice CRM 3 August 7, 2024
News Flash 1 August 7, 2024
MultiPurpose 1 August 7, 2024
MDx 1 August 9, 2024
Busiprof 2 August 12, 2024
Houzez 4 August 12, 2024

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation