Showing 61-80 of 824 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

2 Vulnerabilities
Mar 25, 2024
2 Vulnerabilities
Mar 1, 2017
1 Vulnerability
Aug 14, 2023
1 Vulnerability
Aug 30, 2024
2 Vulnerabilities
Sep 4, 2023
1 Vulnerability
May 6, 2015
1 Vulnerability
Sep 7, 2014
1 Vulnerability
Feb 14, 2022
17 Vulnerabilities
Mar 20, 2024
1 Vulnerability
Oct 8, 2012
2 Vulnerabilities
Dec 17, 2013
1 Vulnerability
Feb 14, 2022
1 Vulnerability
May 15, 2015
1 Vulnerability
Jul 4, 2024
1 Vulnerability
Jun 23, 2023
3 Vulnerabilities
Jul 18, 2023
2 Vulnerabilities
Nov 18, 2024
1 Vulnerability
Nov 8, 2014
1 Vulnerability
Jun 14, 2024
Title Number of Vulnerabilities Last Vulnerability
Astra 2 March 25, 2024
Atahualpa 2 March 1, 2017
Atlast Business 1 August 14, 2023
Attire 1 August 30, 2024
Attorney 2 September 4, 2023
Auberge 1 May 6, 2015
Authentic 1 September 7, 2014
Auto Car 1 February 14, 2022
Avada | Website Builder For WordPress & WooCommerce 17 March 20, 2024
Avanix - Responsive Business WordPress Theme 1 October 8, 2012
Awake 2 December 17, 2013
AwpBusinessPress 1 February 14, 2022
Axioma Premium Responsive 1 May 15, 2015
Bacola - Grocery Store and Food eCommerce Theme 1 December 7, 2023
Bakes And Cakes 1 July 4, 2024
Balkon 1 June 23, 2023
Bani 3 July 18, 2023
Bard 2 November 18, 2024
Barely Corporate 1 November 8, 2014
Basil 1 June 14, 2024

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation