The Wordfence Threat Intelligence Team takes a deeper look at the vulnerabilities from the Wordfence 2022 State of WordPress Security Report
Wordfence-Logo.png (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG8X3pdqSV1-WJV7CgBg-N4vcddMqcBddW23tRzb3P67Q7VbZrm92HLr23W20VRZz5r_TlCW3fLdcd3FpVwTW4gF72C7cNP21W7dPd4X5BlJ_GW2Yv4zh1L_PCTW2MySjJ8ycNjJW2tDL2X85X02DW4qVZHn2TBySZN5PFWRXWKj6VW5SBbFw3qTm0_MHBdmCTpLzMW5ryNQW3C7ms4W7rtDZb2Dh1WwW8HqNyS5rDxVcW614ljT4zYhn1W6_nc576cCQYZVBmff_22GgTL32GC1 )
22 Vulns Featured Image (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG8D5mNXLV3Zsc37CgF2jW59qBwf75nLp8W5DZs6z1_0PFkW6l53gc48mLqzN63-mwttNS3mW89QnbV7Hl9cYW37mWXp3qjQs0V31DBs16vr8gW8nT8_c2zPm_-W7mFHTq3QL9-nW40gJ2q76NgrTN7mV38nc04n3VPy-bN7KVFytW83w6dZ75JQR9W6CtPq56xMFLCW6KDt4C1KK8Q7W8WRlWV5NTKRWW3NZ7SY2xPJxBW4mVpSl9lWvcKW87QDP22zNSWZW1NtpB-1mvNt2W22vzbP6Yk8kgN4BChj5qGtNWW6xR_1t32YgZwW5JVVD41ZYlPPW9hYgxb7pBTV-W2NJpXR6wyTz3W4sZJHM2DrCKMW83y3WY95_ngLV-KgWd5x_yFTW23Zkbj2bvL0KW8SlCbw6jsX5DW73Kmqy4l7fwGW3Ks0gH3fKXDHW5QC3BY7zkxQg3b4m1 )
The Wordfence 2022 State of WordPress Security Report (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbGb53pds1V1-WJV7CgWWxW7-sd9Y855TfrW5hpwf_6Qcp2jW3mWrmD3RzLcyW3rGbKV1JZNbYW8nJdhh14RDfYW6wlXGJ6xPWvmW2n5gg36GPJlQW6KL0LB2BRLdNW2wGGbV22YVxfW1N_SH47rH5d1W7B9Hsr7B9hgHW3s2xkM20wXV9W65qv9d9c4ZXdW4wGF2g2NDRCTW9lbbtz6yQC22W93fdlM4-N4rSN7KqmvSm8XlKW7f3wYm5ymHZCW5XJKY96v1d1jW4gR11290DkH_W4gnP132yRXtSW85hzby4tg1xsVTXvfZ6R5ZnmN1hR-tFp0sP6VGcl_9216rfHVvbD0-33hx3RW8pWSc-2ZDsRQN3Frs2_CWKGM2Vc1 ) was released on January 24th, 2023. One area that we reviewed in this report were the vulnerabilities disclosed in 2022. Keeping in mind that some vulnerabilities affected multiple plugins, themes, and WordPress core, a total of 2,370 vulnerabilities were reported in 2022. The top five vulnerability categories were Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), authorization bypass, SQL Injection (SQLi), and information disclosure. While the statistics sum up what was in the report, the story does not end there.
This email content has also been published on our blog (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG8D5mNXLV3Zsc37CgF2jW59qBwf75nLp8W5DZs6z1_0PFkW6l53gc48mLqzN63-mwttNS3mW89QnbV7Hl9cYW37mWXp3qjQs0V31DBs16vr8gW8nT8_c2zPm_-W7mFHTq3QL9-nW40gJ2q76NgrTN7mV38nc04n3VPy-bN7KVFytW83w6dZ75JQR9W6CtPq56xMFLCW6KDt4C1KK8Q7W8WRlWV5NTKRWW3NZ7SY2xPJxBW4mVpSl9lWvcKW87QDP22zNSWZW1NtpB-1mvNt2W22vzbP6Yk8kgN4BChj5qGtNWW6xR_1t32YgZwW5JVVD41ZYlPPW9hYgxb7pBTV-W2NJpXR6wyTz3W4sZJHM2DrCKMW83y3WY95_ngLV-KgWd5x_yFTW23Zkbj2bvL0KW8SlCbw6jsX5DW73Kmqy4l7fwGW3Ks0gH3fKXDHW5QC3BY7zkxQg3b4m1 ) and you're welcome to post a comment there if you'd like to join the conversation. Or you can read the full post in this email.
The report shows some similarities, as well as distinct differences, to the prior year. This is not uncommon, as WordPress development, both for core and for plugins and themes, potentially includes years’ worth of legacy code, as well as newer code that fits updated coding standards. This tends to have the effect of increasing the number of potential vulnerabilities, while also creating new ways for vulnerabilities to exist.
In addition to changes in code, one major factor in the increase of vulnerability reports in 2022 was likely the fact that it is becoming easier for researchers to report vulnerabilities. As was mentioned in our 2022 report, Wordfence, along with other companies, became a CVE Numbering Authority (CNA) in 2021. This means that there are more points of contact for researchers to submit newly discovered vulnerabilities, and more bandwidth for processing vulnerability reports. As mentioned in our report, we hope to continue to amplify this trend with the launch of Wordfence Intelligence Community Edition (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG9c3pdr7V1-WJV7CgGDRW5X0d3R23F92vVFCcT353FjkJV8DHPz5Gj9wfN7HsC-wTftxxW5XCwkh7pkn3bF818STtSKxtVj_9l323Qq_-W4pWnmD3LK59SV9-1Fh1dBlpJN4fRwklF9dscW4QM7WC3r-NxYV1YQ1R3vJTMSW6d1Vb581l60BW7KqypZ9gcWnWW5s4Hj87k02lCW4FZzPy7x-9Q_W46sqT44wvq9RV2XQzq12y28YTy30l3nR-27W8b6RB85nKCGKW5nFs6t5SnDh9W97WBzQ8n1Ry335nz1 ) , a complete free to access and utilize WordPress Vulnerability Database.
2022 – A Year of Growth
When we look at the types of vulnerabilities being tracked, there is not a lot of difference between 2021 and 2022 when it comes to the most or least common types that have been reported. What did significantly change is the volume of reported vulnerabilities. Every category except open redirects increased in volume from 2021 to 2022. The drop in open redirect reports was minimal, as there was only one fewer report in 2022 as compared to 2021.
Vulnerabilities by category (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG8D5mNXLV3Zsc37Cg-7JW5xx0c78dpN3TW4kjSS82kyNWNW23z9Zw7NRpTVW5Hjw3r7vK25wN77xQp0xVWj4VYLLMv1K67qgW6GwYyd2s7gV9N3Ns9MHlH5mjN3p0jj25q-t3W7VQ4tq1m8lhGW5XJ82L6JWgJNW4H1L1X2rp1JyW6TbP9n4z5SX6W90y6bq6C81sRW5Cl0Nx1bg37bN99DNfYfvYcfVRFyML4kRk0FW2wW3VZ2VXJMvVY2lYD89Y1wFW9lK5Kn2r1hrRN990zHK27R-6N3ySZJq_V9xtW3D7NzR2ytfPDW8TzFZm1MnvtcW7s2jL-5nsBb-W7Xw_Jx2XsYFqW1XQPC77dQqyrW2Shl-r8MtxtSW3jfD_74Y7jMMW58Nc1r5ggxZzW2VQLn_6C-sYPW2hqkKL7lyZ9dW7b8bRs2zXvWgW6PSGkH4CHkGC3lwY1 )
>From 2021 to 2022, there were some changes in the top five vulnerability categories that were disclosed. Most notably, information disclosure overtook file uploads for the fifth spot, highlighting the importance of securing protected and sensitive data. The other change in the top five is CSRF vulnerabilities more than doubling to overtake authorization bypass vulnerabilities – which also nearly doubled from 2021 to 2022.
Top 5 vulnerabilities in 2021 and 2022 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG8D5mNXLV3Zsc37CgS3rW3dQ73b86X7mFW3bfc3423cKbTW3DtMJF6r5f4YW4Yt_NQ2hJHc1W7qjTJ_440VVXVB9_MY7xCtv5W8MHY2y1QyQCfW4344lq4kjBHmN4_WLy6jcMn9W8z2JYx201lxgW5Q_d6C5trk7kVKx1J06HlXMBW32SLvy8cYNS3W6QL8j621Dl4RN1MXzl1spxgYW1_1jy_4TZy9PW8sL5y57SmLq4W67ksgM1SYHLzVZNGL03m9n2hW2Wh6027tzGcZVKW34Y6dkFvdW2sNRl-8rjkwXW3FYYLK95k12mN4Fq4BRcpLhkW7HRCD83wtRTHW70056Z90TcrrW4rjnHd7nJNLMW3r55RV6VH077N8G3r_LRcBXCW3tQH2z60JZncW13m6JS1pDstrW3RYzVZ6pXNySW7d4w6X6DkBLTW4L6BPV6J2VRs3lQs1 )
File upload vulnerabilities are a type in the top-five category from 2021 that was not discussed in the 2022 report. While these vulnerabilities dropped out of the top five in 2022, they still increased from 42 reports in 2021 to 48 reports in 2022. File upload vulnerabilities remain a common vulnerability type to exploit, as they allow would-be attackers to upload files that perform desired functions, typically involving code execution. This includes webshells that allow them to run commands on the server, manage files, and potentially perform other administrative tasks that can be used maliciously in the wrong hands. The fact that it has been out ranked by other types of vulnerabilities does not mean that developers should stop focusing on the prevention of malicious file uploads when working on new or existing themes, plugins, or even WordPress core.
Vulnerability Trends in 2022
Taking a look at the breakdown of where vulnerabilities were reported, it becomes clear that plugins account for the vast majority of reported vulnerabilities. Naturally, we also need to take into account the fact that there are far more plugins out there than themes. However, with that said, this does go to show that WordPress core itself is much more secure, and the concern with security in the WordPress ecosystem may be due to plugins and themes.
Vulnerabilities reported by software type (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG8D5mNXLV3Zsc37CgP6-W7sW5VN5chyP7VHCN7B1nThTLW5M1Wh69cwjrhW8jsznm2T-FkkW7Lt0yN84B8yfW5m9YM736w9M0N9l6_tPS7ZLZW1Wv24Z962P-SV62XVD4VrgXPN2z3LJ-y5NDHN35FHsqlJ7Q5W7NVrHt7WJyMzW87QFV_68ljQzW55mdWf2GDFf4W4FS54X7JbWx5W12MF8j1kmWN-W7210Tc3rgZM6VLwfKR66HDzJF8QJmDF2zXVW1X_zhW1Nbw1zW7swsdP20TdJgW2nn4lZ2cH0JBW3s9x3N6xngSsN2Fk0ZsNMK1KVRc-4n4wCyWkW14w9ml3QxtGgW1lwFDR1M_fSYW92g68v7LBVGJW7lVbzS76kcHYW3kw2941x1lqzW1FKGSW5T5t9FVgNswh2T2YdKW63fJYJ54yfhFW6JkNqT8SCgs63qsG1 )
Of the vulnerabilities disclosed in 2022, all but 824 of them received patches. This means that about two-thirds of the vulnerabilities were patched to prevent exploits against them. The remaining one-third of vulnerabilities are in plugins that were closed or otherwise never patched and should be removed if installed. Having the knowledge of which pieces of software installed on a website could have vulnerabilities is key to keeping the website secure. Whether it is updating the software when a patch is available, or removing the software as long as it remains unpatched, staying updated on vulnerabilities helps to prevent successful website attacks.
WordPress core had 22 reported vulnerabilities throughout the year, and seven themes ranged from 10 to 18 vulnerabilities reported. In all, there were 2,345 plugins and themes with reported vulnerabilities in 2022, in addition to WordPress core. Of these, 562 had more than one vulnerability reported during the year.
Another consideration when looking at vulnerabilities is the access level required in order to exploit the vulnerability. In 2022, there were 614 vulnerabilities that required high level privileges, 553 that required low level privileges, and 1203 that did not require any privileges. On a WordPress website, high level privileges would be those requiring the attacker to obtain editor or administrator level access, while low level privileges would be equivalent to subscriber, contributor, or author.
2022 vulnerabilities by privilege required (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG8D5mNXLV3Zsc37CgMgsW8txM5r3S4gR8W3fwSyC7J3dFhN37Ct28Xh7vxW3v31912v2HMGN3T_MwyyxzP7W79y1RZ3tQmWyW4V1Bqt2w06ZnW3znMfC8Yl8YZW4SqKyc8g-B2-N9hcJCW3qQcLW6Qtt6V4s_YC8W3zFkJS636lr5W37C66-6-BnktW7wwmzh2d1LCbW693x2S3X6gyFW3YCVrD6zsXwMW58hXv75k65tGW1vSDJ-8D21b5W4LznJR3sxnSLW6xl0sR11J8_CW6CZCd55jDRVNVK_TZC4fj7vVW67brd78kqbh5W13nhHg18x0JyW5JWKJC1mfmGnW8ylBfK8MYpxZW19R8MZ4W7LbWW7krYcw94xd7NW2BwV0L2-nw3SW6-qtH7558C0DW65GL6q3qd5JgW3bQGl14JKPprW2jk4Kg2hZdL-W2sXxG96p84Rs36W61 )
Of the vulnerabilities that did not require any authentication on a vulnerable website, 888 of them were reflected cross-site scripting (XSS) or cross-site request forgery (CSRF). These vulnerabilities require user interaction in order to be exploited, such as convincing a user to click a specially crafted malicious link. The remaining 315 vulnerabilities that do not require authenticated access are vulnerabilities that do not require any interaction from a user.
What Will 2023 Look Like?
With January already on the books, 2023 is shaping up to be very similar to 2022. Cross-site scripting (XSS) will be the most common vulnerability reported, with auth bypass, cross-site request forgery (CSRF) and SQL injection (SQLi) having a significant number of reported vulnerabilities as well. Information disclosure vulnerabilities may become less significant, with directory traversal and file upload vulnerabilities making a little bit of a comeback this year, but there is still plenty of time for them to catch up in the coming months.
January 2023 vulnerabilities by category (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG8D5mNXLV3Zsc37CgKtxW56ZYYs5SnZJdW6MWPN18mqbcbW1h6tp91s1GzNW58y30q1JvH7LW3B3YJx319L-DW3J0_yL8d5cjZN7rxm28wR9mPW714Gnz60xBPYN7MyPVfNkK9wW5Xvjpv8CQv8WW8Fb3SN4tyy6bW5pxjC45y_5XnW1HH-Bn2z5lqzW5p-pqc6fY-jqV88VDb5gZ4fyW3GHZx71j0_M4W8xCNj_2hwF03N7JVRZYNyX-fW4ZGqcn202ttXW10sXzM39hNG-W1pQMV32yHx9PW91P8yK83fB-lN70h84rtr4_dW4y9fmK1phzTnVWf_n21WGKhNW6jHh201GQ9b1N173lXk3jn7tN1MBwQ2X_4-dW3gT3cb5JJpd0F46smSyYzB3W3hns2S4xzl9JVj6VKl3p3SqGVvD6GZ4PtJD1N34nd3v4SZs93ghb1 )
The main thing we can count on for 2023 is that we will see more vulnerabilities being reported. It is easier than ever to report vulnerabilities (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG9c3pdr7V1-WJV7CgGHNW6T_n_G72mYDDW2xDvgj8-sJ7SW8f5X3f5Cc42QW4jyZcM3HxZrVVplL3R3WQ_ZHVcFKJh49KNQhW6XHD4T54CC_4W3yp20R3Rx-SxW1VkRDJ2JGqjLVcSkyz4yr3zJW8YqG5Y9kq3h6W1PqWvT7mM06vN10lfmdkVcXkW24Ctr93xS3Y4W65R7Pm3yHZMyW1vStNM4TDgdZW1qNskp6mgMmZN96G-sVz5W07VGCFym5v5-6QW4ycqJZ5kclywW1lyP-t8m6TJpV15DJD9dRkmG3dRg1 ) that have been found, and that is a good thing because it means more vulnerabilities can be remediated effectively.
Conclusion
The increase in reported vulnerabilities illustrates more than ever the importance of keeping websites updated with the latest security updates. The increase seen in vulnerability reports is doing more than ever to keep WordPress secure, but this means that components may need to be updated more frequently as well. WordPress core, themes, and plugins should always be updated as quickly as possible after a new version is released to ensure that vulnerabilities are patched to minimize the chances of a threat actor being successful in their attack attempts. In addition to keeping websites updated, it is also important to implement a solution, like Wordfence, to protect your website from attacks and malware.
Wordfence Premium (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG9w3pdrrV1-WJV7CgPBCW7Tx7wN771VcnW4xJDXD5RY8hZW38nVTp3H9zmTW67TB_j6Z1VYhW2ggFGl2CzXJsN4Kh1M0yNXVcW94Qk3m8t5M0pW5zvhdF6TJB22W1KRrSR1q5YGjW1Qj_NC7lJDDhW4NrYqc7gBcKWW3JXMYM16HB-cN4C_dX_myWY3W62qJnD4KphVHN523K9g9K27kW1gkS9C3xs-ZqW8hFy8j3GbcymW2v7CzL29HpFsW3BCmcm3bdl85N1sxxmc4r1kBW5C-JgR7C--tCW4hGjdz2DLBZzW8x0Rfr4HZtlsW7mKcQD6gGTkp33y31 ) , Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG9w3pdrrV1-WJV7CgXLRW3kJN_z1k-H8XW2JdQdv1xPyvPW1n0DDK2TGvCqW35vxB-3lgBfDW82mV6L2pKWb_W1yBLYq4ymz0RVW14Jd1hYDFVW46LQQ73djF-SW7Czrth4fzP88Vys0-P1tvJfyW2nQqBD7xQy7CW59NNwh4T5g-8W74F9kc4fDrVMW2yqxtN76hVS5W5ChH0z9bDTNTW3t2Cxp8C2xTMVR42Ns7WVcKcW9d7ybF2-106HW2wqsHM1rN4ymW7-RG_F3jpQqzVQ3bDS92gzQwW2qJD8H3m4YDZW43pp9h6Z22QFVwdymD2Sj_7l3mBd1 ) and Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG9w3pdrrV1-WJV7CgV4TW8t1T5f22vVtZW24-7yB4_hnR7W6ZfkwQ4wwz_9W5-zqWT4rrLFcVYvRH278dsGkVrX-G61vJGqnW6TS-Vj5KfGGTW61p2X735ZT0DVn354z42QCJSW3TZn4t93jw7rVqlCLw3LS4NNW5cqDc-2LV0FTW52k3HV8WV1W7W2gKhSc509hzvF2J-mWdBS-0N3BmkQhD9JqYW6HWXBf5gSCHgW5bQnFW48FG1pW2VCBkJ25-57pW2NG07z3326yxW2ygPCm624cc4VB_wMH7cNkmpW873RMX5nc866W5kdm6F2cGshy3n6D1 ) receive new firewall rules and malware signatures as soon as they are available, with new rules and signatures being available to Wordfence Free (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG9w3pdrrV1-WJV7CgGybW86YQcf7jTrWfW5v9jDv16-5_-N6fCx0SRCqNyW753Kmr2X088tVqFVfP7lKGs3W3_qmpD451PGGW7yxGPC2g4ZgbW2fcM7Y47LfvwVDmC835q-prVN3gj3lwZWFbsW67dR8x8649p8W2CRJzq17wzMyW8WJTTM3WYsWjW8xsvLw8x4h-ZMqY4yy58Z38W51Lt7R4q8dKXW8tmFfl6SYd6qN5P_rYX2dGFJW7vj6Y24cB5y7W68KRxn1qkx-PW504vy24l9vR1W2crx0Z8wCRCyW3d0zlJ7m5s-5W6_yXVH4gh9Qp3krR1 ) customers 30 days later. If you believe your site has been compromised as a result of these vulnerabilities, or any other vulnerability, we offer Incident Response services via Wordfence Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG9w3pdrrV1-WJV7CgXLRW3kJN_z1k-H8XW2JdQdv1xPyvPW1n0DDK2TGvCqW35vxB-3lgBfDW82mV6L2pKWb_W1yBLYq4ymz0RVW14Jd1hYDFVW46LQQ73djF-SW7Czrth4fzP88Vys0-P1tvJfyW2nQqBD7xQy7CW59NNwh4T5g-8W74F9kc4fDrVMW2yqxtN76hVS5W5ChH0z9bDTNTW3t2Cxp8C2xTMVR42Ns7WVcKcW9d7ybF2-106HW2wqsHM1rN4ymW7-RG_F3jpQqzVQ3bDS92gzQwW2qJD8H3m4YDZW43pp9h6Z22QFVwdymD2Sj_7l3mBd1 ) . If you need your site cleaned immediately, Wordfence Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG9w3pdrrV1-WJV7CgV4TW8t1T5f22vVtZW24-7yB4_hnR7W6ZfkwQ4wwz_9W5-zqWT4rrLFcVYvRH278dsGkVrX-G61vJGqnW6TS-Vj5KfGGTW61p2X735ZT0DVn354z42QCJSW3TZn4t93jw7rVqlCLw3LS4NNW5cqDc-2LV0FTW52k3HV8WV1W7W2gKhSc509hzvF2J-mWdBS-0N3BmkQhD9JqYW6HWXBf5gSCHgW5bQnFW48FG1pW2VCBkJ25-57pW2NG07z3326yxW2ygPCm624cc4VB_wMH7cNkmpW873RMX5nc866W5kdm6F2cGshy3n6D1 ) offers the same service with 24/7/365 availability and a 1-hour response time. Both of these products include hands-on support in case you need further assistance.
In addition to protecting your website, Wordfence Intelligence Community Edition (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG9c3pdr7V1-WJV7CgGDRW5X0d3R23F92vVFCcT353FjkJV8DHPz5Gj9wfN7HsC-wTftxxW5XCwkh7pkn3bF818STtSKxtVj_9l323Qq_-W4pWnmD3LK59SV9-1Fh1dBlpJN4fRwklF9dscW4QM7WC3r-NxYV1YQ1R3vJTMSW6d1Vb581l60BW7KqypZ9gcWnWW5s4Hj87k02lCW4FZzPy7x-9Q_W46sqT44wvq9RV2XQzq12y28YTy30l3nR-27W8b6RB85nKCGKW5nFs6t5SnDh9W97WBzQ8n1Ry335nz1 ) provides the most up-to-date information on WordPress vulnerabilities, free of charge, helping you to stay on top of vulnerabilities that may affect your website.
The Full Product Lineup:
wf-stacked-free-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG9c3pdr7V1-WJV7CgG4tW19JdtZ1KM1JGVgp74-198HChW2YPpcW6QGNGjTD_5s8CKjySW5btXNg4CtGsqW3GSG1S82tX6LVttrnM9jV7DzW9bKbvc20Pfy8N2DQL_mBj8FbW4LB9PR7L57DJVGwsfZ7sRQlxW203m002xN04qW8BNtRR7hdPc4W1L20Hn554bZjW80W0Xl7LQdJ0W1T9Qz82XqnjnW7l2DnP7x428BW4ND0PT8LpmB3W52159341tW2xW7LnrSS8rXjKgW27h25M3Ykq7RW49NPsW3VN0hh3d9T1 )
wf-stacked-premium-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG9w3pdrrV1-WJV7CgBzcW4b3ryy6mK-vYW763GqN4R0fSCW58f7tS5Fl5znW8ZPXK152xklKW5LcqZk4m7705W2D10Jl7QBw3kW2GtjVW6LJ2fSW6dDm4Q1LH2lpW1bSCTf2XBZPdW4_G1Nw212gLVW5r6HQJ8J7BGDW8qRJHr85207-W5mB2kV4NdfZnW1JSx6M8FwbQ4W88sXkq13lP1mN6K_9b-DWMFQW6bBlHP8BmvpZW6pQQNT1xwyCwW6K-Mrj1wZnd1W4CcHgz1gkb7pW2hMflS8qtqKBW101Yfh982y5MW55W7RL7_p1wZVP9RWL8TgRjF36dW1 )
wf-stacked-care-3 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG9c3pdr7V1-WJV7CgNYbN4mXRJyzhJH5N5Tj8tX36GncW967kfl1jksMkW7JJD6k4TPR70W7jbzh37JtpH6Vs8F3k60nmQxW1WVQdP3sHFtvW3tvMWx1n5SBdN1GzXqFhL_M3W5j8-PY7dnGM7W1_SCXl3lTDpBW1jdj0D4TCK44W96J2HS7n55hgVNTcvf2HjkyQW8vPlJS1qJL1CW7-S_Mq7pTLkcW2XwKbp4fgjfmN51NC0ttfQqKW25wBBJ3fFZ46VZzb-m5KDRgqVjBq6-259LX2W8XmzfW65T93T3j2D1 )
wf-stacked-response-2 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG9w3pdrrV1-WJV7CgV4TW8t1T5f22vVtZW24-7yB4_hnR7W6ZfkwQ4wwz_9W5-zqWT4rrLFcVYvRH278dsGkVrX-G61vJGqnW6TS-Vj5KfGGTW61p2X735ZT0DVn354z42QCJSW3TZn4t93jw7rVqlCLw3LS4NNW5cqDc-2LV0FTW52k3HV8WV1W7W2gKhSc509hzvF2J-mWdBS-0N3BmkQhD9JqYW6HWXBf5gSCHgW5bQnFW48FG1pW2VCBkJ25-57pW2NG07z3326yxW2ygPCm624cc4VB_wMH7cNkmpW873RMX5nc866W5kdm6F2cGshy3n6D1 )
wordfence-intelligence-community-edition-logo (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG9c3pdr7V1-WJV7CgRY5W20Tgx63h2rBqVxSC6d6vWG96W23KCmt7D_sh3N34qTnJFB1SGW3hD4d_6-5_xzW19X7Yk1nLl-BW1-Wr454VtW0HW8x8Tdy5sjZZtVWc8vX1FT_PVW6x_TWQ3M7CsLW1rhK5B1NnvBwV_SJNj7gH5fVW3HXLqX47MZ7yW1M9SDL5B41YdW8YS2tY6TNLw0W7tF4cG1Q46YDW85bLbq86C4z8W217Kjw60095lN4B-sZ2Pq8d9W68l_g621bHXBW2NmKj62Tb434W5lR_v112wJZC38P81 )
logo-defiant (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVpfXG15-l7-W5YT0jg3fkm-ZW3NdgT54Xz-RzN9fbG8X3pdqSV1-WJV7CgFt5W6lG7nR2L7J26W8mC5F67dXZk6W20vkhf7BlY-qW1CctWw7Ls93vW2HYZ7L42r7p3W2bXhs581qdz0VV27132mPkrGW6sz7hy28c2V4W7khDvY8lNLysW39J9Dy6_352nW1R-62q1ZV6bjM_T08LSD8wVW3qZP4q122wwJW2K16bG52d-MjTTsNZ81TzvyVMzPWb7lfrh2W335t-R8ntF36W8sp--q3_vsWCW5l48Fy4VG-fSVyjRX52NZQK-3qnW1 )
Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States
Unsubscribe (
https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcPhW6-Dp8k7snGZVV25tmV5WZr4LW859YtF9gxBwwN8x5jH91yf0NW30hsyJ33S8GhVfKgQZ3vwWQ3n1bWxwG2Y3&v=3&_hsenc=p2ANqtz-95hypd-1BdozV7Cu-kgagXgMinbGaGja0XqIaqAjEYRty50cE-lPG7BOpP9lIRXU3vKhBfC92jLwFsdz4TJApxqlr10g&_hsmi=248132980 )
Manage preferences (
https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcPhW6-Dp8k7snGZVV25tmV5WZr4LW859YtF9gxBwwN8x5jH91yf0NW30hsyJ33S8GhVfKgQZ3vwWQ3n1bWxwG2Y3&v=3&_hsenc=p2ANqtz-95hypd-1BdozV7Cu-kgagXgMinbGaGja0XqIaqAjEYRty50cE-lPG7BOpP9lIRXU3vKhBfC92jLwFsdz4TJApxqlr10g&_hsmi=248132980 )
You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Tue Feb 28 2023 - 19:30:44 CET