The Wordfence Team responsibly disclosed two vulnerabilities in All In One SEO Pack, a WordPress plugin installed on over 3 Million sites.
Wordfence-Logo.png (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0QQ3kWDcV1-WJV7CgWvCW2wP1K05JpKDFW7dGCnX4QCtHnW409NFm1BGkVbW6Dfv5G7knXdhW4dmJmk2GTFJKW3rp-L-66qj9KV3pp5S5sRlsSN4xM8k31J9b9W91rbcD4X8blnW9dW3wr5bRRdvVLn9rG7jp4mPVYBvCh6NgDVHW7nYMV42Sv1qsW7L8S_l27GPHVW3Wl3ST2lBh1VW5kDNnq2wD3GS35191 )
AIOSEO-Blog Post 4 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0SB3kWF_V1-WJV7CgRXFW8wdPV_5HZh64V3TdCk3p1B6KW2nsdnw96dkMyW6N8SLW7Y8pmDW94_vN-2xDPyLW3ZMS258McsyHW1jWRH37q36GDW29cs7k1S20dkW78vNbb4Fw0F1W4dvZj21znDclW44h2NQ4-lhztW13P1hH8WML8vW4GpkHJ1Kgx-jN7R4K4RvBhqlVlMtQ612Q6fsW8Q3Vcp3jD4GyW3gpb9T61q-c_W8Ny4c27klQ_YW20Cqnf4PbJtkW6zKP9x6TMnYFVzkGKd4b7m04W5bSJr88CqFSJW7pH0WJ16b4D4W7NZdSp6mxdp3W5K4lVZ60RFsPW2c4d-_2ltsJGW4qTmPr5Gc5npVN4Jtp7dSP1Z39Jm1 )
All In One SEO Pack Vulnerabilities Impacting 3 Million Sites Patched
On January 26, 2023, the Wordfence Team responsibly disclosed two vulnerabilities in All In One SEO Pack, a WordPress plugin installed on over 3 Million sites which provides search engine optimization tools designed to help content creators optimize their sites and reach more users.
Both reported issues were Stored Cross-Site Scripting vulnerabilities with one of them requiring Administrator-level privileges (CVE-2023-0585) while the other was accessible to Contributor users and higher (CVE-2023-0586).
On January 25, 2023 the Wordfence team issued a custom firewall rule to address the Contributor+ Cross-Site Scripting vulnerability and released it to our Wordfence Premium (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0Rp3kWDQV1-WJV7CgBS-W95vG2-8yXmGFW3C28Yt9kn_0cW79bZkf4XHyQHN2t8Dk3gxQMJW2LN5Bq8WrqGKVrdrKc83cM9LW8tST7M6-mcwpW6gjTGF43yYn1W2_Gx_l6yNHRlW4NZPc26J700HVCKcfK891PW8W73HfkW4lBjj2N7Qhvh46C96YW1WpP4J3nxMKqW3zvm3Z9l5ptdW45hYV51BCbY7N73g2f4Md5XZW2MWgN52GJ_w2W771D1T502RLTW1_t9vb3mLtGP373W1 ) , Wordfence Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0Rp3kWDQV1-WJV7CgMl-W437Vc44GWFdCN45qclTmN1_jN46NQ9sdDl2zVXPndZ3rBCX8W6Xx9275rqxFwW7rVPR28d_GbKW8d210m6jmK1ZN6lGpPXsD1xVVnMNkC66BQxGW2n_Bwj2d8GF0W6GjC5Z2pFLgQW66wz2714TGZrW6sVJvF8wXstCW2p_kcV4900RCW7-JczF4lP-dGW3yvTSJ5RfR75W8cmty42DRPRMW1RGCk_5Q-zTpW5m9mhL3S5sJ0W4Yd1nf3wqX7B3dTk1 ) , and Wordfence Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0Rp3kWDQV1-WJV7CgKYFW88ty9j4pNg7mVbbMSb2TkTjvW96h7p997Y6M7W8cxFgn6DJFMJVM1M4w64RHFPW4Sqd5C8mzmXhW4h0sf95nTfS3W2b78rY1-3t-tW4B1Mr23GGJMYMmLnmbLMjPfW1WgrQ88FJy1wW8yBrN32nFxX8W5WCfcX4pQgqzW8g_H4T4LGgbjN3C32bkY7fw_W7DPgJL9dBfRHW7DnWdd2wg2fxW1nXD-48RZvmhW5tDDBd65MGXXW4bF5yd8Mfrtg3c5r1 ) users. Wordfence Free users received this rule 30 days later. As of February 24, 2023 All Wordfence users are protected against this vulnerability by this rule.
This email content has also been published on our blog (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0SB3kWF_V1-WJV7CgRXFW8wdPV_5HZh64V3TdCk3p1B6KW2nsdnw96dkMyW6N8SLW7Y8pmDW94_vN-2xDPyLW3ZMS258McsyHW1jWRH37q36GDW29cs7k1S20dkW78vNbb4Fw0F1W4dvZj21znDclW44h2NQ4-lhztW13P1hH8WML8vW4GpkHJ1Kgx-jN7R4K4RvBhqlVlMtQ612Q6fsW8Q3Vcp3jD4GyW3gpb9T61q-c_W8Ny4c27klQ_YW20Cqnf4PbJtkW6zKP9x6TMnYFVzkGKd4b7m04W5bSJr88CqFSJW7pH0WJ16b4D4W7NZdSp6mxdp3W5K4lVZ60RFsPW2c4d-_2ltsJGW4qTmPr5Gc5npVN4Jtp7dSP1Z39Jm1 ) and you're welcome to post a comment there if you'd like to join the conversation. Or you can read the full post in this email.
Vulnerability Summaries
Description: Authenticated (Contributor+) Stored Cross-Site Scripting (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0Sh3kWFJV1-WJV7CgNfqW6fhnmd3ywdrpW97r7wQ4H3PX4W29zpQx681lYMW8TkdHQ3St4MrW4FxCLs8QV260W10t3tD3hmDd3W3zkWvS42_QqFVySgQv3Lsw-nN8frvPNV490SW6Bn7-_3gZsF4W7QcRvN3dgrLtW6GTrbt1D62BrW4f5tMr7LTtVJW7vVwdz70ZRlqW29hqH87X2RPwVqzxBt7wVs-LW13Vcpg8KG6ZFW76FwgM86MHFKW25hBQX1vYwZ7W9h8gsd6jKF_YVJtSTK3xdzF4W6YXdzk6F9L4nVyNRBQ28kl_SW5hnDy03pzx2rW5H28tP5QHZWZW63wQHK47zHqY3mCJ1 )
Affected Plugin: All In One SEO Pack
Plugin Slug: all-in-one-seo-pack
Affected Versions: <= 4.2.9
CVE ID: CVE-2023-0586
CVSS Score: 6.4 (Medium)
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Researcher/s: Ivan Kuzymchak (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0R_3kWFpV1-WJV7CgVjkN23YtH8j4P78W7HTl--1tvKR6VpxqbG4rjKnbW6fzJ5g4S231zN8QVk2gGf6zLW8hc7rZ50VKk0VlJXK48FhRchW6nZWyj2178G7W7vkGQ_2xCV-dW7dRQ_M3wlzGjW7qQy2P8FZK3yW6CkwHf5GqqvzW7V4C3K21GNT_W1SzkJh7Y3RvnW71x5Dr2Q8b13N6t2hBF4wvTsW7TZSnp4Gk6hNW99ZhYV43rnKBW7QBMZw5ZMTzfW4mVx7x4-9JtDW5DWfRf2p1zy-W1Jd9BN8W1wBRVTbYSF19BW1zW70NlfL7sMw-v3hp-1 )
Fully Patched Version: 4.3.0
The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Contributor-level access or higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Description: Authenticated (Administrator+) Stored Cross-Site Scripting (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0Sh3kWFJV1-WJV7CgHbnW4zZQHC79gLD0W8DQx3T36C2k6W5Q_SZ86wJ0_fW3qsg9G2DK6wVW1yMCZR49JSLhW6sDF9125MW7-N49_F_m7r5m4W7j8L0N8JQRfcW7fXcqR7SPGSXW5Ys89c367MdZW3Z2KgD1FxsBQVwD5gQ1sjbrcW4NmdFY7n7Hq3W53sgSh2MgBwGW1R09L64JJM2nW3cV15s63HhgGW5TNvsG548ntMW265y-q1zbfkxW5qYr5_5lcnsCW8LZsrS3LXqypW1p3Dt91qxz2hW7xBb324Tx7vnN1CcbCClrDjmW9kBZGn58tpflW94WF782jq_R5W4XGcXl3x1ztS3qpj1 )
Affected Plugin: All In One SEO Pack
Plugin Slug: all-in-one-seo-pack
Affected Versions: <= 4.2.9
CVE ID: CVE-2023-0585
CVSS Score: 4.4 (Medium)
CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
Researcher/s: Ivan Kuzymchak (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0R_3kWFpV1-WJV7CgVjkN23YtH8j4P78W7HTl--1tvKR6VpxqbG4rjKnbW6fzJ5g4S231zN8QVk2gGf6zLW8hc7rZ50VKk0VlJXK48FhRchW6nZWyj2178G7W7vkGQ_2xCV-dW7dRQ_M3wlzGjW7qQy2P8FZK3yW6CkwHf5GqqvzW7V4C3K21GNT_W1SzkJh7Y3RvnW71x5Dr2Q8b13N6t2hBF4wvTsW7TZSnp4Gk6hNW99ZhYV43rnKBW7QBMZw5ZMTzfW4mVx7x4-9JtDW5DWfRf2p1zy-W1Jd9BN8W1wBRVTbYSF19BW1zW70NlfL7sMw-v3hp-1 ) and Marco Wotschka (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0R_3kWFpV1-WJV7Cg-MbW1n_TGd36_p6HN58SshW3Vty_W6P4C1Z72BvmGW16nPll5-hTCXW3zQvx35qdzkNW6JKcn08HVt3kW9cTRVc6kzRzxW5dYVnW5YY2VVW2vYCpR1hg-xQW37fX_y5gpkS_N98TyW7TGcq2W6XmJBv5RRNJrW5WlMz04JlrxYVV29gG1y-4-hW3mlx8-4cx9sXW5m_KKW2BGB_QW9kY2Mm2DzTNGW3HXDbv5f9zR0W2FLwx65GQZH2VW3llV8PwfXdW6_RVdZ4CTX_ZN5tqSJ__K5XcW6nF61z75bslLW3r7J7z5_bWQ836Dr1 )
Fully Patched Version: 4.3.0
The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Administrator-level access or above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Vulnerability Analysis
The All In One SEO Pack plugin provides site owners with an intuitive interface to assist in optimizing site content for search engines, both during setup as well as on an ongoing per-post and per-page basis. Unfortunately, vulnerable versions of this plugin fail to escape submitted site titles, meta descriptions and other elements during post and page creation, and when changing plugin settings. This made it possible for users with access to the post editor, such as contributors, to insert malicious JavaScript into those fields, which would execute in the browser of any authenticated user, such as a site’s administrator, editing such a post or page.
This is a likely scenario to occur as posts written by contributors have to be reviewed and moderated prior to publication.
xss1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0SB3kWF_V1-WJV7CgRXFW8wdPV_5HZh64V3TdCk3p1B6KW2nsdnw96dkMyW6N8SLW7Y8pmDW94_vN-2xDPyLW3ZMS258McsyHW1jWRH37q36GDW29cs7k1S20dkW78vNbb4Fw0F1W4dvZj21znDclW44h2NQ4-lhztW13P1hH8WML8vW4GpkHJ1Kgx-jN7R4K4RvBhqlVlMtQ612Q6fsW8Q3Vcp3jD4GyW3gpb9T61q-c_W8Ny4c27klQ_YW20Cqnf4PbJtkW6zKP9x6TMnYFVzkGKd4b7m04W5bSJr88CqFSJW7pH0WJ16b4D4W7NZdSp6mxdp3W5K4lVZ60RFsPW2c4d-_2ltsJGW4qTmPr5Gc5npVN4Jtp7dSP1Z39Jm1 )
This vulnerability is a little more unique than the ones we have covered in the past as the vulnerable code is executed as a result of modifying the Domain Object Model (DOM) in the victim’s browser after the page loads. More specifically, in the screenshot above the plugin uses the input in the Post Title field and creates a Snippet Preview on the fly. The malicious code is stored, but does not get executed until this DOM modification takes place. This type of Cross-Site Scripting vulnerability is often referred to as DOM-XSS.
Similarly, an Administrator could modify the Search Appearance or General Social Media settings to include the same malicious payload, which resulted in malicious JavaScript code execution, when editing pages or posts as well as when viewing the all post/page listing.
xss-admin (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0SB3kWF_V1-WJV7CgRXFW8wdPV_5HZh64V3TdCk3p1B6KW2nsdnw96dkMyW6N8SLW7Y8pmDW94_vN-2xDPyLW3ZMS258McsyHW1jWRH37q36GDW29cs7k1S20dkW78vNbb4Fw0F1W4dvZj21znDclW44h2NQ4-lhztW13P1hH8WML8vW4GpkHJ1Kgx-jN7R4K4RvBhqlVlMtQ612Q6fsW8Q3Vcp3jD4GyW3gpb9T61q-c_W8Ny4c27klQ_YW20Cqnf4PbJtkW6zKP9x6TMnYFVzkGKd4b7m04W5bSJr88CqFSJW7pH0WJ16b4D4W7NZdSp6mxdp3W5K4lVZ60RFsPW2c4d-_2ltsJGW4qTmPr5Gc5npVN4Jtp7dSP1Z39Jm1 )
It is important to keep in mind that malicious code may be executed within the context of an administrator’s browser sessions and could be used to generate new malicious user accounts and be utilized for code manipulation among other things. As such, these types of vulnerabilities should be taken seriously even if Contributor-level privileges are required for successful exploitation.
Timeline
January 25, 2023 – Wordfence releases a firewall rule to address the Contributor+ Stored Cross-Site Scripting vulnerability.
January 26, 2023 – The Wordfence team responsibly discloses the vulnerabilities to the plugin vendor.
January 27, 2023 – The vendor confirms receipt and begins work on a fix.
February 6, 2023 – Release 4.3.0 addresses both vulnerabilities.
February 24, 2023 – The firewall rule to address the Contributor+ Stored Cross-Site Scripting vulnerability is released to our Wordfence Free users.
Conclusion
In today’s post, we covered two Cross-Site Scripting vulnerabilities in All In One SEO Pack, a search engine optimization plugin with over 3 Million users. The Wordfence Threat Intelligence team issued a firewall rule providing protection against the Contributor+ Stored Cross-Site Scripting vulnerability on January 25, 2023. This rule has been protecting our Wordfence Premium (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0Rp3kWDQV1-WJV7CgBS-W95vG2-8yXmGFW3C28Yt9kn_0cW79bZkf4XHyQHN2t8Dk3gxQMJW2LN5Bq8WrqGKVrdrKc83cM9LW8tST7M6-mcwpW6gjTGF43yYn1W2_Gx_l6yNHRlW4NZPc26J700HVCKcfK891PW8W73HfkW4lBjj2N7Qhvh46C96YW1WpP4J3nxMKqW3zvm3Z9l5ptdW45hYV51BCbY7N73g2f4Md5XZW2MWgN52GJ_w2W771D1T502RLTW1_t9vb3mLtGP373W1 ) , Wordfence Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0Rp3kWDQV1-WJV7CgMl-W437Vc44GWFdCN45qclTmN1_jN46NQ9sdDl2zVXPndZ3rBCX8W6Xx9275rqxFwW7rVPR28d_GbKW8d210m6jmK1ZN6lGpPXsD1xVVnMNkC66BQxGW2n_Bwj2d8GF0W6GjC5Z2pFLgQW66wz2714TGZrW6sVJvF8wXstCW2p_kcV4900RCW7-JczF4lP-dGW3yvTSJ5RfR75W8cmty42DRPRMW1RGCk_5Q-zTpW5m9mhL3S5sJ0W4Yd1nf3wqX7B3dTk1 ) and Wordfence Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0Rp3kWDQV1-WJV7CgKYFW88ty9j4pNg7mVbbMSb2TkTjvW96h7p997Y6M7W8cxFgn6DJFMJVM1M4w64RHFPW4Sqd5C8mzmXhW4h0sf95nTfS3W2b78rY1-3t-tW4B1Mr23GGJMYMmLnmbLMjPfW1WgrQ88FJy1wW8yBrN32nFxX8W5WCfcX4pQgqzW8g_H4T4LGgbjN3C32bkY7fw_W7DPgJL9dBfRHW7DnWdd2wg2fxW1nXD-48RZvmhW5tDDBd65MGXXW4bF5yd8Mfrtg3c5r1 ) users since that date, while those still using our free version received this rule on February 24, 2023.
If you believe your site has been compromised as a result of this vulnerability or any other vulnerability, we offer Incident Response services via Wordfence Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0Rp3kWDQV1-WJV7CgMl-W437Vc44GWFdCN45qclTmN1_jN46NQ9sdDl2zVXPndZ3rBCX8W6Xx9275rqxFwW7rVPR28d_GbKW8d210m6jmK1ZN6lGpPXsD1xVVnMNkC66BQxGW2n_Bwj2d8GF0W6GjC5Z2pFLgQW66wz2714TGZrW6sVJvF8wXstCW2p_kcV4900RCW7-JczF4lP-dGW3yvTSJ5RfR75W8cmty42DRPRMW1RGCk_5Q-zTpW5m9mhL3S5sJ0W4Yd1nf3wqX7B3dTk1 ) . If you need your site cleaned immediately, Wordfence Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0Rp3kWDQV1-WJV7CgKYFW88ty9j4pNg7mVbbMSb2TkTjvW96h7p997Y6M7W8cxFgn6DJFMJVM1M4w64RHFPW4Sqd5C8mzmXhW4h0sf95nTfS3W2b78rY1-3t-tW4B1Mr23GGJMYMmLnmbLMjPfW1WgrQ88FJy1wW8yBrN32nFxX8W5WCfcX4pQgqzW8g_H4T4LGgbjN3C32bkY7fw_W7DPgJL9dBfRHW7DnWdd2wg2fxW1nXD-48RZvmhW5tDDBd65MGXXW4bF5yd8Mfrtg3c5r1 ) offers the same service with 24/7/365 availability and a 1-hour response time. Both of these products include hands-on support in case you need further assistance. If you have any friends or colleagues who are using this plugin, please share this announcement with them and encourage them to update to the latest patched version of All In One SEO Pack as soon as possible.
If you are a security researcher, you can responsibly disclose your finds to us and obtain a CVE ID (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0R53kWDwV1-WJV7CgYx9W60svD_4hpPSXW2Jl3RR9hjzk_V7Wk701Yp9FtN7lBh_yjQBCyV2B1RY4jcB8LW2Nzh478lKpTFW2rGsXm6X-ZN9W17ZcfQ6L5RM4N7S4_WWTwpn0N8McglpGnHNRN3sFfr_LtFw1W5T8TM_6ClyHvW8pvHCR1B55xnVlfHlJ1kGcgzN4l445qB1VWQW3vb8hc8htX1NW3R2qBr8_6Xd3N4FBCsHs8ZcD3kvj1 ) and get your name on the Wordfence Intelligence Community Edition leaderboard (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0RJ3kWF5V1-WJV7CgK_xW2sR-w593MnmDW8l9fvc2sY1YhW79CsM_8t3sgHW6J2LDh7cWVqmW4V4HBm658_bGW8bq2f88g7Mf6W6ZpByD3vlvHyVJNWg517s6NtW1HjGT53X2jL-W7yZXKr7vQmlLW26-sZ-293vCnW4cXF593ZqHj5W6g0Dhb3NDvz1W2c1w6X7dvpSpN6gJ3hNGW8L1W3MVQFg3141t8W8-BFgD8q2lH6VbtTpS9f1BCRW313qTc6Zpp5vW5JTHfJ9hbTGKW87ZWHk2RG2RkVZGCsg4WBj2l3q1p1 ) .
The Full Product Lineup:
wf-stacked-free-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0Rp3kWDQV1-WJV7CgRyqN6tqDmrTj9MsW12RtPd108cP1W4dmGLT761201W2DqTFZ72pHTLN89TNpWlGSlgW8Lx9dK3vc0Z7W8kb_xY8xqGDvW6wyT1b4Z8PWXW5QnL8f2SYMCpW2gPs5Z7t0WrGMHhfDg1X8C-W6mYlbH1Ks0_CW2Z_fv613XgNSW5j2LP88Hy_DFW1r4dZ_7gG8P6W7TLBd26SlZ3fW3st4WK4N6m5GW7CCV5687DgzyW56D_Fp1cz8dvW5Vvg0X6Mpkmh3plL1 )
wf-stacked-premium-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0Rp3kWDQV1-WJV7CgWlSW8bhQx13JQNg8W5Z4LQx6TthXhW6vwjb04zC2hKW6TnQnt8734tQW14qsPm6YQzf5W7pGvh52vxzvKN2nvhhS76tdxW2p1rxX9hQ2HsW30bSzT38Hl8xV7spMg1GLM12W5kxtyq5gFcgmW386T8t5JB2FrW3y_4wV7vNSSTW7fKdGQ8gNW75W1nZJKK42_XgsW2qg4qs9g-7XcW3Qpfcy6qkpPwW1jQpkC5Kbr-8W7KWwG05f3v7lW20l3sP1zsZSQ3dkL1 )
wf-stacked-care-3 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0Rp3kWDQV1-WJV7CgNptW6wcrTn8RXQvyW1_71yK2XkFVZW4H8z0w2tqwhfW1nCT6K4DrS5YW6mrkM961w5-bW1qp_RT7Tq43hW3qkGSP3NNcJvW7MFC3G8SD8v3W10_Lk83zNPlpW1lF5DW4CN2D4N2SMtY08_3B2W3Q5c3d4K9Q8VVSzjc46fc_93W7JCm1g5jM4rqW4LFMCF4Nv5cnW6Vvk4d6rTcCfW2DcX-C6JBKwcW896FzG5lbRMXW5nxH4x9g_1CFN14_M5dwSw7y34xC1 )
wf-stacked-response-2 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0Rp3kWDQV1-WJV7CgKYFW88ty9j4pNg7mVbbMSb2TkTjvW96h7p997Y6M7W8cxFgn6DJFMJVM1M4w64RHFPW4Sqd5C8mzmXhW4h0sf95nTfS3W2b78rY1-3t-tW4B1Mr23GGJMYMmLnmbLMjPfW1WgrQ88FJy1wW8yBrN32nFxX8W5WCfcX4pQgqzW8g_H4T4LGgbjN3C32bkY7fw_W7DPgJL9dBfRHW7DnWdd2wg2fxW1nXD-48RZvmhW5tDDBd65MGXXW4bF5yd8Mfrtg3c5r1 )
wordfence-intelligence-community-edition-logo (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0R53kWDwV1-WJV7CgCwrN94Jc3G36QMxN8gR9Gsxz4c-W82wP4x3FkXpdW2QhQ9Q7PfyvyW2RqbDQ68FFlgVXN-JM91_jw1W5NgXBw7hMTJsW1tPRvT50hZ_4W68RhMf7KQHyxW6mtTyZ2Md2ZqW6KgBJx8_y5sgW6HYy3M73S1qLW5ZmnDN1xMwwtW1D1k1s6VwHCkW5zqm3p2qK7VfN1JSpCXgMz3qW28_yqP8hstbLW7GNFST4Y2hHl3lvY1 )
logo-defiant (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR3sd5VqJx5W87jrQN5XJrM2W805GfB4XxTszN5BW0QQ3kWDcV1-WJV7CgVrsW4sJc7J6Mv5DLW505c3n8d8hnpW67dKR28461F0W33wYbS4qVfSDW5h-TVf5WFpxMW2H47Bp60Mp6KW5JVD6S2NCYKtW3lpSgz8WdBMcW3R5Vyv5JGSQMW7NWSVr7wkk2vW2tZWng8syvmgN3RcfBb91v5TW7T8KPd6Jk4GnW3Y4jzq7xL1L9W5h3K5J5K8JT1W4t8JvB47cMv93pQm1 )
Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States
Unsubscribe (
https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFfJW6lFkzs8Y_c5-V25zF796hyDFN5GxN69Wy3-DN5VvtmdXk_7QVbv-hj2wPQ4cN5_DZpM96C_nw5K1kH7m7t2&v=3&_hsenc=p2ANqtz-9OQPiffkJBqelkwuTSFuFmrF1zMEfNWRSkyOyA9oVVs_KIGl3d6I0ldbfzxc6S_zmZ_b1CiF81BykfvGWH4DdfrBuFhg&_hsmi=247938055 )
Manage preferences (
https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFfJW6lFkzs8Y_c5-V25zF796hyDFN5GxN69Wy3-DN5VvtmdXk_7QVbv-hj2wPQ4cN5_DZpM96C_nw5K1kH7m7t2&v=3&_hsenc=p2ANqtz-9OQPiffkJBqelkwuTSFuFmrF1zMEfNWRSkyOyA9oVVs_KIGl3d6I0ldbfzxc6S_zmZ_b1CiF81BykfvGWH4DdfrBuFhg&_hsmi=247938055 )
You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Mon Feb 27 2023 - 19:36:11 CET