[WordPress Security] Update Now! Severe Vulnerability Impacting 600,000 Sites Patched in Limit Login Attempts

From: Wordfence <list_at_wordfence.com>
Date: Tue, 11 Apr 2023 10:07:08 -0700

The Wordfence team responsibly disclosed an unauthenticated stored Cross-Site Scripting vulnerability in Limit Login Attempts

Wordfence-Logo.png (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPtV3kWDcV1-WJV7CgVtNW43Mndk6YNNS7W5ym5Ms26VFlfW4HKC9Q1dLq6zW2VfDXw7N-xccN69bQ58JkCQVW8RWq1R3ZLwgvN95tqGqbhCRqW40Q5n59bs1SGW20R4qC25M47tVq6WWs7ly9QCVM8sbt1l48PBW5qLr9Q5Vh81jW4JD55W3mJbv0W4wXBBd2L0pB5W4gl5YV4PGdgzW7TB6Ph1PqTnx3m7h1 )

LimitLoginAttempts (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPwZ3kWGhV1-WJV7CgWQ3W5WFLcX3KXqjwW3VzbDR6NKvKtVGwHyC6J5jSNVY74c54hLHClW6MW79F90GBBBW99hR334MrDjLW2Kt5NS4PTsYQW1xcJR-5lNTNJW6rBdnf2Bn2MmW3YnvkC6Mm0JDW92Fcm925nCkBW3L9B8y3cyLtnW8PQRQD2y1vSFW8nmch_7GK_vFW4bJw5l4PFcQZW7RDQ1z4bhcdKW5-jnrW3t7m2YW7q_1nc7C0tFnW8Pv61N5HF2LMW7mydZt5nHrY0W88y0n26cXghgW4Z9D7D76m80BW2GN5D17Rrjl3N5JfDg-www1-W2lvt8T1qyVflW39BWs24xkZTwW8XqTjt1dFgjKW3gTWJJ4NvQLTW8YDYZ_5cRHQvW96NRk_1_MwYB3c0B1 )

Update Now! Severe Vulnerability Impacting 600,000 Sites Patched in Limit Login Attempts

On January 26, 2023, the Wordfence team responsibly disclosed an unauthenticated stored Cross-Site Scripting vulnerability in Limit Login Attempts, a WordPress plugin installed on over 600,000 sites that provides site owners with the ability to block IP addresses that have made repeated failed login attempts.

The plugin is vulnerable in versions up to, and including, 1.7.1. A patch addressing this vulnerability was released on April 4, 2023 as version 1.7.2. We recommend all site owners update to version 1.7.2 as soon as possible.

All Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPvt3kWDQV1-WJV7CgG4nW4mmb845VsWpQW26By6r8cr4RdN4dXN6ZYChs4W35n5Jh3pyTWKW4mG47n4FCP9BV3J_P74tml5yW10t_k396LWTJW87zZCV8KlmjkW5Zs4Vp6sCtzlW6sh3KF3Nm-V5W45-7Cb8LMdrhN4kxfC7BY9FlW4hyhy54lTW9rVvnPkG63qbHBN1zpLCHT5kYtW1h0Xp14fB01FW3CLNZJ3zp3zMW6FkCSY2hbd02W6Kg-pw2PTXkWW3-yBXW8wVn4r38FB1 ) , Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPvt3kWDQV1-WJV7CgGFlW2YT83h2_D7T6W2p0Gsv5_0y98W6-cRv01vptpBW6WQqRl2ktgjHW32-yhN8qb7VhN8VK2nSYDDDDW4WpVCv69vDDZW4JsP-z4xczCYW7yFXJt1rKs2BN1CfygJpVP-zN5spgDhHm1D_N2gGrc4pxVy1W4cCWw26nWpp5W3Zwgbq8vgLNvW1R2Wty3szbxfMyrsPRXJgmTW80KHSf8kK2qkTr9zh3RNGflW3jX_P767lXfhW8d7TpJ3kPkQN35Y-1 ) , and Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPvt3kWDQV1-WJV7Cg-srW2wBFGM3VM_yKW5nN9G01VNTpDW2J3gQF8JWp5fVSXsqq21LWL4W6FKZPL8JrxDyW9jtMxk3SjMNRVls_l68FHx43W7Z0-Nn2WJz1hN5PNgmB3LCVMVgPBf58lMVK_W5PzTSN4tQxDhW2lmslL3MmgvtW3FY7HB4Tn9CyW7XwsZZ4n2FPCN51X8ZS9Sd0HW5KqlGp935RJfW3Xw50t74ZG3nW6DWwcs2wmVS9W8jgL5s4VMrZgW4PJvhw6WF0rc31pf1 ) customers, along with those still using the free version of the plugin, are protected by the Wordfence firewall against any exploits targeting this vulnerability.

This email content has also been published on our blog (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPwZ3kWGhV1-WJV7CgWQ3W5WFLcX3KXqjwW3VzbDR6NKvKtVGwHyC6J5jSNVY74c54hLHClW6MW79F90GBBBW99hR334MrDjLW2Kt5NS4PTsYQW1xcJR-5lNTNJW6rBdnf2Bn2MmW3YnvkC6Mm0JDW92Fcm925nCkBW3L9B8y3cyLtnW8PQRQD2y1vSFW8nmch_7GK_vFW4bJw5l4PFcQZW7RDQ1z4bhcdKW5-jnrW3t7m2YW7q_1nc7C0tFnW8Pv61N5HF2LMW7mydZt5nHrY0W88y0n26cXghgW4Z9D7D76m80BW2GN5D17Rrjl3N5JfDg-www1-W2lvt8T1qyVflW39BWs24xkZTwW8XqTjt1dFgjKW3gTWJJ4NvQLTW8YDYZ_5cRHQvW96NRk_1_MwYB3c0B1 ) and you're welcome to post a comment there if you'd like to join the conversation. Or you can read the full post in this email.

Vulnerability Summary

Description: Limit Login Attempts <= 1.7.1 – Unauthenticated Stored Cross-Site Scripting (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPwm3kWFJV1-WJV7CgZTpW3h-3y-9713HbV2l6Rc1ZjtVZW7L5LpM7dtSzKW2SYmPh5PrbDLW4rd9h4184NT3W15q8F872_65ZW8hd9kq296pN7MmNwMhlLmhHW7HBFgm4yMqXKW1P9yXZ7T6CHyW81jPR51_sPSvW7x2r2q2F6VjRW4kQXtL7RZVr1W2H9JMp2h3qLLW5s9s0w4Qtp98W4vp6Xc3GFL6VVl6l2s9hfpgHW8SRkk51cCGkDW1ff9zL1s9czgW4Kh-GQ4qlXRSW4dLtLs2Bt7vZW8LkYPP4l1dyzW8ff95s3BFxgnW7VLmxM7LMTb1V_wdsB6GH6w4W7f6kxB5VRmy83jlv1 )

Affected Plugin: Limit Login Attempts

Plugin Slug: limit-login-attempts

Affected Versions: <= 1.7.1

CVE ID: CVE-2023-1912

CVSS Score: 7.2 (High)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Researcher/s: Marco Wotschka (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPw33kWFpV1-WJV7Cg-HbW13DjnL11689dW476l-_6y4xXxW4dvcc-1_FlmfW4WHY_72MzDxrW1BJqDS8ckclgW11lrSG2fCnqNW7cb3l87yvzmyN3D4JDTdwnK2W1m9v4N4kyvq6W2mnqv_3Cxly3N5v1YfMcwcH2N4FSKk6Mxh0HW8XfZt52SzkxBW118mJP7JmPQ2W6PK9y19dZVRXN2Y9vSk9x-7PV-RLw25glYxcW23l4dw62pd2HW40FGBw35lLRQW8vnQ1P7F7lR_W7fkFdN3kMvNqW6TDPz28DrfszW14BxtN7LMW8VW3LVJ_k2dM3j-322s1 )

Fully Patched Version: 1.7.2

Vulnerability Details

The Limit Login Attempts plugin offers some simple configuration options. These include a maximum number of login retries, lockout duration, lockout expiration times as well as some logging and notification options. The vulnerability, assigned CVE-2023-1912, requires a specific configuration: the site connection option must be set to “From behind a reversy [sic] proxy” and logging of IP addresses on lockout must be enabled.

limit-login-attempts-config-page (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPwZ3kWGhV1-WJV7CgWQ3W5WFLcX3KXqjwW3VzbDR6NKvKtVGwHyC6J5jSNVY74c54hLHClW6MW79F90GBBBW99hR334MrDjLW2Kt5NS4PTsYQW1xcJR-5lNTNJW6rBdnf2Bn2MmW3YnvkC6Mm0JDW92Fcm925nCkBW3L9B8y3cyLtnW8PQRQD2y1vSFW8nmch_7GK_vFW4bJw5l4PFcQZW7RDQ1z4bhcdKW5-jnrW3t7m2YW7q_1nc7C0tFnW8Pv61N5HF2LMW7mydZt5nHrY0W88y0n26cXghgW4Z9D7D76m80BW2GN5D17Rrjl3N5JfDg-www1-W2lvt8T1qyVflW39BWs24xkZTwW8XqTjt1dFgjKW3gTWJJ4NvQLTW8YDYZ_5cRHQvW96NRk_1_MwYB3c0B1 )

With the reverse proxy detection option enabled, the plugin uses the X-Forwarded-For header to determine the visitor’s IP address. While this HTTP header is spoofable, the plugin does offer its use as an alternative for those who are behind a load balancer or cache handler. It does not use this setting by default.

With the plugin’s logging feature enabled, login blocks are logged and displayed on the configuration page. The following code accomplishes this (slightly edited for legibility).

limit-login-attempts-vuln-code (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPwZ3kWGhV1-WJV7CgWQ3W5WFLcX3KXqjwW3VzbDR6NKvKtVGwHyC6J5jSNVY74c54hLHClW6MW79F90GBBBW99hR334MrDjLW2Kt5NS4PTsYQW1xcJR-5lNTNJW6rBdnf2Bn2MmW3YnvkC6Mm0JDW92Fcm925nCkBW3L9B8y3cyLtnW8PQRQD2y1vSFW8nmch_7GK_vFW4bJw5l4PFcQZW7RDQ1z4bhcdKW5-jnrW3t7m2YW7q_1nc7C0tFnW8Pv61N5HF2LMW7mydZt5nHrY0W88y0n26cXghgW4Z9D7D76m80BW2GN5D17Rrjl3N5JfDg-www1-W2lvt8T1qyVflW39BWs24xkZTwW8XqTjt1dFgjKW3gTWJJ4NvQLTW8YDYZ_5cRHQvW96NRk_1_MwYB3c0B1 )

As can be seen, this function assembles a table of information but does not escape the values it uses. While sanitization is recommended as input is received, escaping output, even if it is already sanitized, is a far more effective tool in preventing Cross-Site Scripting. Unfortunately, this plugin was not utilizing either sanitization or escaping of the stored IP value that could be supplied via the X-Forwarded-For: header.

To exploit this vulnerability, an attacker could send a login request with the following X-Forwarded-For header set:

X-Forwarded-For: <span onmouseover=alert(1)>23.23.23.23</span>

This header can be set via many methods, such as through a browser plugin or by intercepting the login request and adding it manually. Once the plugin’s blocking threshold is met, it will record the above code as the blocked IP and execute the malicious JavaScript code when an administrator visits the configuration page where the list of blocked IP addresses is displayed. This malicious code is executed under the authentication of an administrator and can be utilized to help facilitate a site takeover.

Cross-Site Scripting Vulnerabilities are the result of missing sanitization and unescaped display of user input. Most commonly, we see user input that is exploitable to Cross-Site Scripting collected via a form. In this vulnerability, the processed information is still provided by a user, but collected via a different and more unusual route which is why proper sanitization and escaping may have been missed.

Timeline

January 26, 2023 – We reached out directly to the WordPress Plugin Security Team as no contact information was readily available for the developer of the plugin.

March 24, 2023 – The WordPress Plugin Security Team team acknowledges receipt of our report.

April 4, 2023 – Version 1.7.2 addresses this issue.

Conclusion

In today’s post, we covered an unauthenticated Cross-Site Scripting vulnerability via the X-Forwarded-For header in the Limit Login Attempts plugin. This can be leveraged by unauthenticated attackers to facilitate a site takeover by injecting malicious JavaScript into the database of an affected site that may execute when a site administrator accesses the logging page.

Again, all Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPvt3kWDQV1-WJV7CgG4nW4mmb845VsWpQW26By6r8cr4RdN4dXN6ZYChs4W35n5Jh3pyTWKW4mG47n4FCP9BV3J_P74tml5yW10t_k396LWTJW87zZCV8KlmjkW5Zs4Vp6sCtzlW6sh3KF3Nm-V5W45-7Cb8LMdrhN4kxfC7BY9FlW4hyhy54lTW9rVvnPkG63qbHBN1zpLCHT5kYtW1h0Xp14fB01FW3CLNZJ3zp3zMW6FkCSY2hbd02W6Kg-pw2PTXkWW3-yBXW8wVn4r38FB1 ) , Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPvt3kWDQV1-WJV7CgGFlW2YT83h2_D7T6W2p0Gsv5_0y98W6-cRv01vptpBW6WQqRl2ktgjHW32-yhN8qb7VhN8VK2nSYDDDDW4WpVCv69vDDZW4JsP-z4xczCYW7yFXJt1rKs2BN1CfygJpVP-zN5spgDhHm1D_N2gGrc4pxVy1W4cCWw26nWpp5W3Zwgbq8vgLNvW1R2Wty3szbxfMyrsPRXJgmTW80KHSf8kK2qkTr9zh3RNGflW3jX_P767lXfhW8d7TpJ3kPkQN35Y-1 ) , and Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPvt3kWDQV1-WJV7Cg-srW2wBFGM3VM_yKW5nN9G01VNTpDW2J3gQF8JWp5fVSXsqq21LWL4W6FKZPL8JrxDyW9jtMxk3SjMNRVls_l68FHx43W7Z0-Nn2WJz1hN5PNgmB3LCVMVgPBf58lMVK_W5PzTSN4tQxDhW2lmslL3MmgvtW3FY7HB4Tn9CyW7XwsZZ4n2FPCN51X8ZS9Sd0HW5KqlGp935RJfW3Xw50t74ZG3nW6DWwcs2wmVS9W8jgL5s4VMrZgW4PJvhw6WF0rc31pf1 ) customers, along with those still using the free version of the plugin, are protected by the Wordfence firewall for any exploits targeting this vulnerability.

Special Note: We independently discovered this vulnerability in January while reviewing a vulnerability in another plugin. We followed our responsible disclosure process and reported it to the WordPress Plugin Security Team, ensured it got patched, and published it to our vulnerability database once a patch was released. After adding the vulnerability to our database, we were made aware of another unnamed security researcher who also discovered this issue and publicly disclosed details about this vulnerability five years ago without ensuring the vulnerability got patched, which does not follow standard practice. Regardless, we would like to make mention of this so the other researcher who also found the vulnerability receives credit.

If you have any friends or colleagues who are using this plugin, please share this announcement with them and encourage them to update to the latest version of Limit Login Attempts as soon as possible.

If you are a security researcher, you can responsibly disclose your finds to us and obtain a CVE ID (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPv93kWDwV1-WJV7CgHwbW4FM1rP6G9Vd-W8K0Rkj81b7syW3zSHt89brJ3RW1H2b4L1RbsHpW6XykdW9fLXlJW6PkTVy34TlBZW6Wxd0w491S9CW8D8sJd6hk9yhW3K6g3W4qyN03W6JMhh86sD2-RW43Vv9H7m3XLjN188bGXgsV7RvhHPVpZDmW7nGGYh3ZkXGDW5-mHSl4TdWBYN8QdG0cpbHKCVKHZgd2lQ3SQMvj4y1Qq-SS36Jn1 ) and get your name on the Wordfence Intelligence leaderboard (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPvN3kWF5V1-WJV7CgFXDVC8Ssn5-Mg7TW8WNSSL4bfw2SW1y-Rhl8WNL7mW6mCFwt3-S5P9W7qpJQZ1p0-6fN8YxC2Sy3k0NW1LC0Jm9cFm6YW1tRkn22_XgnNW8H-KMW5nJ05ZW1R_K-h1zGTmvW2xbsBN2c2scMW1GbHs92mKpDhW8klBMf7m7xgRLMZQtCjxFFW2cpYwH2sk9qSW1ZtCdL4KFQQpM6rSJqbkMP8W3wQzm676RDDcW41l-H36W6lpHN6QN5H4WfFNnW4hfx376kvNP2W5wydZC3h9LQ33pQ41 ) .

The Full Product Lineup:

wf-stacked-free-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPvt3kWDQV1-WJV7CgBBHN1DsZyWs9WYtN3qDx_9rChnpW1LmQKb7ZcWvfW37dTgM5dHwNPW30-DVX7KX7wqW7Y3FWV3QXwQBW87zWHm3mZ2HbN4sQNbQ2rcPTN2c44d-twz3kW90_kr44DWcqkVDTWVd5-ZxjqW8SxTCT1Tjx3RW77MvhR9jrnxxW5038zr3-HSK3VWJ0YW3yxcHcW6RH8RQ9hrNHpW3shKH35VdsyMW2nNcH635fxlSVkdcq32NX5p2W1LQMDQ75NV2m36g61 )

wf-stacked-premium-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPvt3kWDQV1-WJV7CgL66W5f0Zs82ZTqQyW7B1CSw2xTQj5W5fmVQt2q2ww_W16BmBs8Cj0TBW73RSd87dqZYHV69Bnr4f_KByW4pg-Mh80JYj6N58fj1-bvP_rW29RkMF2y03BmW7h5DnF2s2dmKW4ZFdsr1SH1x2W5smnc94B7MY5W984ttj3LQq6_W1bjJb95TnZdPW2wRkwl16_rccN8s3N1ggZcQ4W4nTSgB8lCWJ1V7txXT9lf_fkW1VJ2XP1K35F8W3n-MZC35FBWC31Zn1 )

wf-stacked-care-3 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPvt3kWDQV1-WJV7CgND4W6G0ylW3Z6MnVV62r_71wTjm8W90ZDGq5nrhHtW5sBqtf8jt8G7N3ZpF2CxMw25W4sJSK47T0Xh-W2DPZKM3hYy6CW808SKB106mG1N72jjdrr9Y0HW25GNS51mCtHdW8rNc6k8q6Y0GW8JzTzh6NYJ-_W98s0ZM7hMNJzVXjpjQ5Td6qdN7Pk-lfDFhnVW2lcKN03qlJtfW7qCgrw2hb7ZMW8Hpvyy7GScRpW4MHYc3243s88N6XDwn78KFDw3kHF1 )

wf-stacked-response-2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPvt3kWDQV1-WJV7Cg-srW2wBFGM3VM_yKW5nN9G01VNTpDW2J3gQF8JWp5fVSXsqq21LWL4W6FKZPL8JrxDyW9jtMxk3SjMNRVls_l68FHx43W7Z0-Nn2WJz1hN5PNgmB3LCVMVgPBf58lMVK_W5PzTSN4tQxDhW2lmslL3MmgvtW3FY7HB4Tn9CyW7XwsZZ4n2FPCN51X8ZS9Sd0HW5KqlGp935RJfW3Xw50t74ZG3nW6DWwcs2wmVS9W8jgL5s4VMrZgW4PJvhw6WF0rc31pf1 )

wf-logo-intelligence-h-800 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPv93kWDwV1-WJV7CgTsQN5Rf-rvrcSCdVJ1xQX118vPVN2_tH-hkYGvSVM1hfg6mQ3mVW2xs2Fv4Kx10NW3Zl4St5pcdKWW3G5cpg4-GPgMW8zTHTm5WqLh7W2x9S-527QGXjW8f6JdS381pvfW2-qW3S6cW-PRW65S8KT9c9JbSW2NnZP24mdJV8W7_4Qx32ctHWbW7T8BN55zcyFGW7X4Shm2hqJCVW3MDZxv4nDxKPW8bRnrh7P7gwJ361B1 )

logo-defiant (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVSyJ920yv31VCTkVK3ZmDL3W4FBnYy4ZdVP0N7nzPtV3kWDcV1-WJV7CgWd2W4qkkn16bL2_bW4BwBRx5fTPvcVkBN6r1MCdz_W2qRGZq4nbTWqN3V92pnn9RfGW3FvRJN2BNbWSW7Svgg_50Bj9MW60lQvv2tfZ2kV_yQFV355tVSW1_34FY7-qJFnW4NlD7X4nbtYqW9lG76H6NV-36W7-d9XZ2Y9tzSW5JX4rh64djnRV18ctd72YsgcW60HPQ-7-Bcl73jz41 )

Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States

Unsubscribe (https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcPLW8VrlSH59b-PwV25rPq7cWxW6W7NPHlx7pJ5h3N91KZKN1yf0NN30-Vcnnyw6fW39YLSq3xs-DzmMnq-V3w3&v=3&_hsenc=p2ANqtz-_f6M9I0866dVE8I7DCaXpQwwTo1mUSg5d4BDRdcAVFtzZDZuk2dlCAF8aT2ejxHe70VIW0_djGp2RgEHvkdjjXbs6wEg&_hsmi=253872217 )

Manage preferences (https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcPLW8VrlSH59b-PwV25rPq7cWxW6W7NPHlx7pJ5h3N91KZKN1yf0NN30-Vcnnyw6fW39YLSq3xs-DzmMnq-V3w3&v=3&_hsenc=p2ANqtz-_f6M9I0866dVE8I7DCaXpQwwTo1mUSg5d4BDRdcAVFtzZDZuk2dlCAF8aT2ejxHe70VIW0_djGp2RgEHvkdjjXbs6wEg&_hsmi=253872217 )

You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Tue Apr 11 2023 - 19:07:11 CEST

This archive was generated by hypermail 2.3.0 : Tue Apr 11 2023 - 19:12:54 CEST