Showing 801-819 of 819 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

3 Vulnerabilities
Jan 11, 2022
1 Vulnerability
Feb 6, 2021
1 Vulnerability
Apr 10, 2024
1 Vulnerability
Mar 26, 2020
1 Vulnerability
Jul 15, 2012
6 Vulnerabilities
Apr 25, 2024
1 Vulnerability
Jul 26, 2023
3 Vulnerabilities
Feb 27, 2024
1 Vulnerability
Nov 30, 2012
1 Vulnerability
Jul 5, 2024
1 Vulnerability
Apr 26, 2024
1 Vulnerability
May 13, 2024
1 Vulnerability
Sep 27, 2011
1 Vulnerability
Jul 17, 2024
3 Vulnerabilities
Jan 11, 2022
3 Vulnerabilities
Jan 11, 2022
3 Vulnerabilities
Jan 11, 2022
2 Vulnerabilities
Sep 24, 2019
Title Number of Vulnerabilities Last Vulnerability
WPparallax 3 January 11, 2022
Wyzi - Social Directory WordPress Theme 1 February 6, 2021
X-T9 1 April 10, 2024
Xenon - Bootstrap Admin Theme with AngularJS 1 March 26, 2020
xmas 1 July 15, 2012
XStore 6 April 25, 2024
Ya'aburnee - Magazine & E-Commerce Theme | News / Editorial 1 March 4, 2015
Your Journey 1 July 26, 2023
Yuki 3 February 27, 2024
Yvora - Premium WordPress Theme | Portfolio 1 November 30, 2012
zBench 1 July 5, 2024
Zeever 1 April 26, 2024
Zeka 1 May 13, 2024
ZenLite 1 September 27, 2011
Zenon Lite 1 July 17, 2024
Zigcy Baby 3 January 11, 2022
Zigcy Cosmetics 3 January 11, 2022
Zigcy Lite 3 January 11, 2022
Zoner - Real Estate WordPress Theme 2 September 24, 2019

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation