Showing 121-140 of 796 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

2 Vulnerabilities
Oct 21, 2019
1 Vulnerability
Oct 29, 2012
3 Vulnerabilities
Mar 13, 2023
1 Vulnerability
Sep 29, 2012
1 Vulnerability
Apr 26, 2024
2 Vulnerabilities
Jul 18, 2023
1 Vulnerability
Oct 29, 2012
2 Vulnerabilities
Feb 9, 2024
3 Vulnerabilities
Jan 11, 2022
2 Vulnerabilities
Jul 9, 2024
1 Vulnerability
Apr 20, 2015
1 Vulnerability
Nov 13, 2013
1 Vulnerability
Aug 14, 2023
1 Vulnerability
Feb 14, 2022
1 Vulnerability
Jul 5, 2024
1 Vulnerability
Aug 10, 2023
1 Vulnerability
Feb 14, 2022
1 Vulnerability
Feb 14, 2022
2 Vulnerabilities
Aug 12, 2024
2 Vulnerabilities
May 16, 2023
Title Number of Vulnerabilities Last Vulnerability
Bridge - Creative Multipurpose WordPress Theme 2 October 21, 2019
Brightbox 1 October 29, 2012
Brilliance 3 March 13, 2023
Brisk 1 September 29, 2012
Brite 1 April 26, 2024
Broadcast Lite 2 July 18, 2023
Broadscope 1 October 29, 2012
brooklyn 2 February 9, 2024
Brovy 3 January 11, 2022
BuddyBoss Theme 2 July 9, 2024
BuilderChild-Depot 1 April 20, 2015
Bulteno Theme 1 November 13, 2013
BunnyPressLite 1 August 14, 2023
BusiCare 1 February 14, 2022
Business One Page 1 July 5, 2024
Business Pro 1 August 10, 2023
BusinessExpo 1 February 14, 2022
Businesswp 1 February 14, 2022
Busiprof 2 August 12, 2024
BuzzStore 2 May 16, 2023

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation