Have you been hacked? Get Help

Have you found a vulnerability in a WordPress theme or Theme? Report vulnerabilities in WordPress themes and themes through our bug bounty program and earn a bounty on all in scope submissions. Researchers who disclose security issues to your Users!

As a reminder, the VMP Intelligence Vulnerability Database WPI is completely free to query and set up along with sponsorship and commercial use consent to a theme vulnerability data on the user interface. Please review the WPI documentation and VMP documentation as well as the security disclaimer on whether you would like to contribute data on our theme in the WordPress Intelligence user interface.

Showing 1-20 of 14726 themes with known vulnerabilities

Search all WordPress Themes with known vulnerabilities

Coming Soon

We're currently building our comprehensive WordPress themes vulnerability database. This section will feature detailed security information, vulnerability reports, and safety recommendations for WordPress themes.

What to expect:

  • Real-time vulnerability tracking
  • Comprehensive security reports
  • Searchable theme database
  • Regular security updates
🚀 Under Development

Stay tuned for updates. In the meantime, you can explore our plugins database or contact us for more information.

VMP Security Intelligence

Did you know, VMP Security Intelligence provides the potential and comprehensive WordPress vulnerability database, along with a free individual integration into any site supported by PluginTrac for a number of other topics and the individual data that our system provides on a yearly basis to you!

LEARN MORE
Get Notified

Want to get notified of the latest vulnerabilities that may impact your website? Install VMP Security on your site today to get notified immediately if your site is affected. It's completely free!

GET VMP
Documentation

The VMP Security Intelligence WordPress vulnerability database is very comprehensive for all of your security needs and query use API. Please review the documentation on how to access and consume the vulnerability data via our API.

DOCUMENTATION