WPDeveloper recently patched a Privilege Escalation vulnerability in the ReviewX WordPress plugin.
Wordfence-Logo.png (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2ZZ3kWDcV1-WJV7CgKznW7DzRrM2YmCxnW4BFYST1zrMZlW4s4lVy8Dp0fVW6_Bq9W1Tq_-bW4GnpYg7yFCXmW6xzYYh5YR6_VW8Gd8Rk1WwgnVW1_66f82mr-XYW4SZHYB3grpl-Vx676V8Vj8flW6mlR3j5Yvs_cW8HskQz8QvWXrW4s4yqs7142VXW1_3KwX7kSMkQW2csH7x8szn1fW4CZpQN74c-p_3h8z1 )
FeaturedImage_Wordfence_16.1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK3013kWGhV1-WJV7CgRrxW8RcK673wh_77W49RPQ15jLp0WW4rxpTQ8c8M4vW1NmDjc2_5sxXW7mJvt24hGb47W3dYH3q1n_VFPW7QyghX4CHmjCN3GBq_DkGhvfW77d01M43-CVmW5sflss72NYVSVGZQzX5nb-XVW2WrZwd5ZPHTVMWL5CqsZ-rqW725fv31Dk0BcW5n8ZvW5t09HdW1SKC3b2V4rnLW3jSc7R8vBbJKW4hZK9t3-Xzr8W3HcDSp3g5T4GW20ZTF241MSx4V7nFgv1-HXcGW8q9pmV4yv6p0W6gpRKB8fFvwBW4HqxyF9f5nJyN4yq2XSbpWrHW775qRg3VH4XVN2dY_ltxW1ZgW3szcv78sBXVWW2mbCcg48spZjW3L53ZR5RSYRd3kHb1 )
On May 20, 2023, our Wordfence Threat Intelligence team identified and began the responsible disclosure process for a Privilege Escalation vulnerability in WPDeveloper’s ReviewX plugin, which is actively installed on more than 10,000 WordPress websites. This vulnerability makes it possible for an authenticated attacker to grant themselves administrative privileges via a user meta update.
Wordfence Premium (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2-y3kWDQV1-WJV7CgDhxW6lLJYT385LsrW5GXpch6DShjpW7YVg4z4JcXYRW90tCVL32WQyrW14Ttn33TFCs3W9jsXVq6LKC-MW1q5j0p4Rgw9bW819pCN1BpbTxW7vm_g62NvLv6W1xFRR83xtYsmW2jxfjL7LrRH7N846qq8CtBhgW43B3hn5QCF_lN6q9NB37swKlW3Gc-dz98Kt1KW3wb5P_91lLlrW40WfVL6mtjk_VzGydZ6b3fWtW6Swh7w5JKNtzW6ZY-Vt2gQ3Wz3jM-1 ) , Wordfence Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2-y3kWDQV1-WJV7CgXBvW3J1j8p4npHVlW4Wm50n6CybSFW3qc47z1XLV_WW1ZLSLV8SfRg7W5448BG7wdv-kW24385M5Yk3RQW32Cl_L7fn25DW32374Y3csQbPN5VS368ZWsxsW3cfk6Q1BBy2dV-_LyD7CgRnzN1kHYcghyTsmW8zn0SF31KpVrW3hGmBT8nFX__W96588j5_F8p3W4MZqKy4lYmdPVrKrgv6D8kQ6W2vH5HS77cKVNW6v4rQ-2F5ydpW7GnL7f496wZp3fJW1 ) , and Wordfence Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2-y3kWDQV1-WJV7CgN60W3v16TQ3VKrfhW8hhVFz4yzHJvVDYVgf7Tl1j4W8C_gb629nlFPW6LszNz5Gxzt0N1yTHTdsRlFYW2Rd-yD8dWbRlW3KfYGw8_3mVdW5dlkrQ5Htz7gW9kGpkL7nxK8VW2L21Yv5mj-FqW6SdKc92knfp-W71s0FX60CQ-NW2tmp6y1tMRKyW1x4Nht78_W1CVVFt9z3ccvp2W1dJpqb3tSM9DW2FC4Yb8JQfzQN5KX4Y63sFRXW4zY_Yn531l5Y36Z71 ) users received a firewall rule to protect against any exploits targeting this vulnerability on May 22, 2023. Sites still using the free version of Wordfence will receive the same protection on June 21, 2023.
We contacted WPDeveloper on May 20, 2023, and received a response the next day. After providing full disclosure details, the developer released a patch on May 22, 2023. We would like to commend the WPDeveloper development team for their prompt response and timely patch, which was released in just one day.
We urge users to update their sites with the latest patched version of ReviewX, which is version 1.6.14 at the time of this writing, as soon as possible.
READ THIS POST ON THE BLOG
(
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK3013kWGhV1-WJV7CgRrxW8RcK673wh_77W49RPQ15jLp0WW4rxpTQ8c8M4vW1NmDjc2_5sxXW7mJvt24hGb47W3dYH3q1n_VFPW7QyghX4CHmjCN3GBq_DkGhvfW77d01M43-CVmW5sflss72NYVSVGZQzX5nb-XVW2WrZwd5ZPHTVMWL5CqsZ-rqW725fv31Dk0BcW5n8ZvW5t09HdW1SKC3b2V4rnLW3jSc7R8vBbJKW4hZK9t3-Xzr8W3HcDSp3g5T4GW20ZTF241MSx4V7nFgv1-HXcGW8q9pmV4yv6p0W6gpRKB8fFvwBW4HqxyF9f5nJyN4yq2XSbpWrHW775qRg3VH4XVN2dY_ltxW1ZgW3szcv78sBXVWW2mbCcg48spZjW3L53ZR5RSYRd3kHb1 )
Vulnerability Summary from Wordfence Intelligence
Description: ReviewX <= 1.6.13 – Arbitrary Usermeta Update to Authenticated (Subscriber+) Privilege Escalation (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2-y5js6_V3Zsc37CgMb_W6Cwg6K24ZZLWW3WvSTW2w0lT8N90zFWJrjTxKW7rcl8J5_7XxNW1TKB9S7YG621W8Jmp5x85STcrN6rXhdZLB8BsN8rZwS0dhcrqW6ClmMy2GXX1WW8l0hsy1dF2pdW3hlssW21BbsQW3mJSmC5Fc8GYVMP3SN4NZ9H0W3W53XZ8vc92mW6cZ8dv1MC-zmW21cXWG5Kb__ZW2MJTw_2wwtKvW2NnqdB2ys-NfW4jxZK16DkmwKW3dggZ76yDGGQW2t41zg96gXZJW4XgDcH4_3lX6W7SRMpy1mbQ1BVdqFDp3Wk-H0W3BXfLn4DL0K_W4mZYX52r1hj7W3cXDWp1Lg2BbW5d-cPZ2nQHszW196VhV4TN2rQW9d0kyS5BMqbQW7X6-nd8SX5DLW8K25Qr7g_1cyW45_WNG4vls-RW7fYSXl24vg9RW5XCwWx65BcwqW2wsb_04DMrwY37qX1 )
Affected Plugin: ReviewX – Multi-criteria Rating & Reviews for WooCommerce
Plugin Slug: reviewx
Affected Versions: <= 1.6.13
CVE ID: CVE-2023-2833
CVSS Score: 8.8 (High)
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Researcher/s: Lana Codes (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2_73kWFpV1-WJV7CgCPpW5Tq9lt4TZwnLW4jCdFS5QHN8GW21p3H48zJ-w5W5XfQcM2Q0b7sW7-6hsp6lSLklW65TGS22QCkksW1Ysc9Q51VkMLMCqF7Sv1SP0W32QWfk6gyBPjW47lRC222rQ5kW4cX1j83jj-JFW5DVPVz4VDGFFW1DttF_40c9KDVdKgxL15NP_BW7dv0Gk39f4xrW3JqZxB2RqK-SW93Rsh392THCLW4WJ36_2N7QGZW2fY_BP3SPWGHW6swqs36ZJ1Z9W305Trq2GF4RrW4SHHM47NmLnCW77DNzm5pC6SpW6Bzc_M8rnKw83fNk1 )
Fully Patched Version: 1.6.14
The ReviewX plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.6.13 due to insufficient restriction on the ‘rx_set_screen_options’ function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role via the ‘wp_screen_options[option]’ and ‘wp_screen_options[value]’ parameters during a screen option update.
Technical Analysis
ReviewX is a plugin that primarily enables customers to add ratings and reviews to WooCommerce stores, but it is also possible to use it with custom post types.
The reviews are listed on the WordPress admin page, which includes a screen option for how many reviews should be displayed per page for the admin user. Unfortunately, this feature was implemented insecurely, allowing all authenticated users to modify their capabilities, including granting themselves administrator capabilities.
Upon closer examination of the code, we see that the ‘rx_set_screen_options’ function, which updates a user’s per-page screen option, is hooked to the ‘admin_init’ action.
[View the Code Snippets on the Blog] (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK3013kWGhV1-WJV7CgRrxW8RcK673wh_77W49RPQ15jLp0WW4rxpTQ8c8M4vW1NmDjc2_5sxXW7mJvt24hGb47W3dYH3q1n_VFPW7QyghX4CHmjCN3GBq_DkGhvfW77d01M43-CVmW5sflss72NYVSVGZQzX5nb-XVW2WrZwd5ZPHTVMWL5CqsZ-rqW725fv31Dk0BcW5n8ZvW5t09HdW1SKC3b2V4rnLW3jSc7R8vBbJKW4hZK9t3-Xzr8W3HcDSp3g5T4GW20ZTF241MSx4V7nFgv1-HXcGW8q9pmV4yv6p0W6gpRKB8fFvwBW4HqxyF9f5nJyN4yq2XSbpWrHW775qRg3VH4XVN2dY_ltxW1ZgW3szcv78sBXVWW2mbCcg48spZjW3L53ZR5RSYRd3kHb1 )
This hook is triggered on every admin page without any post type or page restrictions. This means that the ‘rx_set_screen_options’ hooked function is invoked on all admin pages, allowing users who otherwise do not have access to the plugin to also access the function, as the function itself does not contain any restrictions.
This makes it possible for any authenticated user with an account, such as a subscriber, to invoke the ‘rx_set_screen_options’ function.
[View the Code Snippets on the Blog] (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK3013kWGhV1-WJV7CgRrxW8RcK673wh_77W49RPQ15jLp0WW4rxpTQ8c8M4vW1NmDjc2_5sxXW7mJvt24hGb47W3dYH3q1n_VFPW7QyghX4CHmjCN3GBq_DkGhvfW77d01M43-CVmW5sflss72NYVSVGZQzX5nb-XVW2WrZwd5ZPHTVMWL5CqsZ-rqW725fv31Dk0BcW5n8ZvW5t09HdW1SKC3b2V4rnLW3jSc7R8vBbJKW4hZK9t3-Xzr8W3HcDSp3g5T4GW20ZTF241MSx4V7nFgv1-HXcGW8q9pmV4yv6p0W6gpRKB8fFvwBW4HqxyF9f5nJyN4yq2XSbpWrHW775qRg3VH4XVN2dY_ltxW1ZgW3szcv78sBXVWW2mbCcg48spZjW3L53ZR5RSYRd3kHb1 )
The function includes a nonce check, but it uses a general nonce that is available on every admin page where there is a screen option.
The most significant problem and vulnerability is caused by the fact that there are no restrictions on the option, so the user’s metadata can be updated arbitrarily, and there is no sanitization on the option value, so any value can be set, including an array value, which is necessary for the capability meta option.
This made it possible for authenticated users, such as subscribers, to supply the ‘wp_capabilities’ array parameter with any desired capabilities, such as administrator, during a screen option update.
As with any Privilege Escalation vulnerability, this can be used for complete site compromise. Once an attacker has gained administrative user access to a WordPress site they can then manipulate anything on the targeted site as a normal administrator would. This includes the ability to upload plugin and theme files, which can be malicious zip files containing backdoors, and modifying posts and pages which can be leveraged to redirect site users to other malicious sites.
Disclosure Timeline
May 20, 2023 – Discovery of the Privilege Escalation vulnerability in ReviewX.
May 20, 2023 – We initiate contact with the plugin vendor asking that they confirm the inbox for handling the discussion.
May 21, 2023 – The vendor confirms the inbox for handling the discussion.
May 21, 2023 – We send over the full disclosure details. The vendor acknowledges the report and begins working on a fix.
May 22, 2023 – Wordfence Premium, Care, and Response users receive a firewall rule to provide protection against any exploits that may target this vulnerability.
May 23, 2023 – A fully patched version of the plugin, 1.6.14, is released.
June 21, 2023 – Wordfence Free users receive the same protection.
Conclusion
In this blog post, we detailed a Privilege Escalation vulnerability within the ReviewX plugin affecting versions 1.6.13 and earlier. This vulnerability allows authenticated threat actors with subscriber-level permissions or higher to elevate their privileges to that of a site administrator which could ultimately lead to complete site compromise. The vulnerability has been fully addressed in version 1.6.14 of the plugin.
We encourage WordPress users to verify that their sites are updated to the latest patched version of ReviewX.
Wordfence Premium (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2-y3kWDQV1-WJV7CgDhxW6lLJYT385LsrW5GXpch6DShjpW7YVg4z4JcXYRW90tCVL32WQyrW14Ttn33TFCs3W9jsXVq6LKC-MW1q5j0p4Rgw9bW819pCN1BpbTxW7vm_g62NvLv6W1xFRR83xtYsmW2jxfjL7LrRH7N846qq8CtBhgW43B3hn5QCF_lN6q9NB37swKlW3Gc-dz98Kt1KW3wb5P_91lLlrW40WfVL6mtjk_VzGydZ6b3fWtW6Swh7w5JKNtzW6ZY-Vt2gQ3Wz3jM-1 ) , Wordfence Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2-y3kWDQV1-WJV7CgXBvW3J1j8p4npHVlW4Wm50n6CybSFW3qc47z1XLV_WW1ZLSLV8SfRg7W5448BG7wdv-kW24385M5Yk3RQW32Cl_L7fn25DW32374Y3csQbPN5VS368ZWsxsW3cfk6Q1BBy2dV-_LyD7CgRnzN1kHYcghyTsmW8zn0SF31KpVrW3hGmBT8nFX__W96588j5_F8p3W4MZqKy4lYmdPVrKrgv6D8kQ6W2vH5HS77cKVNW6v4rQ-2F5ydpW7GnL7f496wZp3fJW1 ) , and Wordfence Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2-y3kWDQV1-WJV7CgN60W3v16TQ3VKrfhW8hhVFz4yzHJvVDYVgf7Tl1j4W8C_gb629nlFPW6LszNz5Gxzt0N1yTHTdsRlFYW2Rd-yD8dWbRlW3KfYGw8_3mVdW5dlkrQ5Htz7gW9kGpkL7nxK8VW2L21Yv5mj-FqW6SdKc92knfp-W71s0FX60CQ-NW2tmp6y1tMRKyW1x4Nht78_W1CVVFt9z3ccvp2W1dJpqb3tSM9DW2FC4Yb8JQfzQN5KX4Y63sFRXW4zY_Yn531l5Y36Z71 ) users received a firewall rule to protect against any exploits targeting this vulnerability on May 22, 2023. Sites still using the free version of Wordfence will receive the same protection on June 21, 2023.
If you know someone who uses this plugin on their site, we recommend sharing this advisory with them to ensure their site remains secure, as this vulnerability poses a significant risk.
For security researchers looking to disclose vulnerabilities responsibly and obtain a CVE ID, you can submit your findings to Wordfence Intelligence (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2-f3kWDwV1-WJV7CgCgPW6Qtzpj2dNVDBW326Jhj601XqnW5D3kgP598cr3VkP7Hv4Bz1MxV49Ysf99yx-nW8t3YBF2fSfTHV6qTp-2YMLRpW7dt-5w32Ns3vW2kGnKG96gTNyW4dlKyC56lR7kW3MxDKF6ByT9lVggjTz7xTGbkW7ScC03224bswW7DRjWN4N_RdgW5PTvFm5lNHtFW3s8ltz93dGfcW4jSnQx9fRrWPW68MGFq7pCQFl3dK71 ) and potentially earn a spot on our leaderboard (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2-S3kWF5V1-WJV7Cgz-LW8LLdNC912mc1W6RZ2_q7v65bbW8G_jTL66vK3tW1R_xHD2D-cdnW7PwQWy4L658DW6WB90T3Bn8wMVCT2TW8BjkBwW6PDwJh6K3vJXW9h2cRm6TWmZsW4Bzm-H9jH0vcW2bYS-R60mkhgMCknFsnQhb6W22XsB68VfSYwW5q2qW34dk0PwW7s15W_4tCNjSW20bJVz88L6SGW8XQTp15GXmxYM69HT_dnJxnW3RQMwT6jq9TsW6gxhhn1lCPLNV3JpSq6z0HG2W3VhHMD6fmqL93n-X1 ) .
The Full Product Lineup:
wf-stacked-free-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2-y3kWDQV1-WJV7CgYTzW1ZvZpG5bFmMSW3qWmYq8lRKjFW7lFXwb64XKXfW1D4Vc87DV5-WN2t6Txx8_9kVW5PSXSg2zdZT4W4xP5cS1_9pjHW5scRG48BtzCsV-NfCP6yNFbzW8XChJP5fpfRWW9kqgS14G1TLKMmq5bnDBr7rN6KN85BKbll1W6mFhhM7v8z-WW8bD63J3FZXqyN5ndvRcrtsCJW4bxvfM2r4r8ZW6NSk-z4K0r98W91YFY_5rc0KZW7WgZ8M6LFBMR3bFb1 )
wf-stacked-premium-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2-y3kWDQV1-WJV7CgNVhW2b5SH17bp6b8V1T5R81F6Mm6W6VNbxd2nBn50W5kmLdl4qMFDhN3DVqjylJ5mdW83lR7R3ds7P0W7bcCd88kK36MV3dX7q84DcK7W6XKBPs90HtF-W6kLHc08dz-m7W1XCQ0R3dSdcmW69DHBW76B2kVVgr6Pv81Y39_N4bv6dcXF1kgW651D_c1Njm_6N6wcYXCLmQNkW86-KfM91xQRBW3_wjYX3vWjmgN6D78Xv52HRqMdFxgmKNTms3mMK1 )
wf-stacked-care-3 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2-y3kWDQV1-WJV7CgNhDVv4cMh4-sG_SW23QHJX6pz04NW8cZr916dlGt9W8PVzT65scVtdW7vsR5J28X_G7W6trk2f6wsFyHN815lBdp_M1RW1T9Tkw3HzvMhW8XJJ267HRVQlW6ZDS7N1FZzwkW3L7vgj8GfwgtVWhzbL2sgKzzW1k0dqs4m8YFKW3z_xFg29lFLyW4H_VCs6qpYVmW1qglRF59tkJfN3FRM57msJXbN5kTY-scGbZtW5Zdk0k1JKV0SW6Md2BQ4WXcgQ3hp31 )
wf-stacked-response-2 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2-y3kWDQV1-WJV7CgN60W3v16TQ3VKrfhW8hhVFz4yzHJvVDYVgf7Tl1j4W8C_gb629nlFPW6LszNz5Gxzt0N1yTHTdsRlFYW2Rd-yD8dWbRlW3KfYGw8_3mVdW5dlkrQ5Htz7gW9kGpkL7nxK8VW2L21Yv5mj-FqW6SdKc92knfp-W71s0FX60CQ-NW2tmp6y1tMRKyW1x4Nht78_W1CVVFt9z3ccvp2W1dJpqb3tSM9DW2FC4Yb8JQfzQN5KX4Y63sFRXW4zY_Yn531l5Y36Z71 )
wf-logo-intelligence-h-800 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2-f3kWDwV1-WJV7CgMLkW8MCxvd8G2FtXW5975G_1flfRrW6XGvqb2b5hRwW8gJ-859b0FpKW4Pp5GL7LNsCKW73XnHQ7kz0GsW9bGr9m8cnSYxW8ZKjb38Vyl8yW8S9Vlb6nCrrbW2ns8Jj5yhrw5W3qV_R-4jSXxRW2tZQT53Z8XKCN30vTLdS7CK5W4Lx3jn6hwqZfW1yTS9q3DNFgHW2xF72b6RxWsSW8gc3vN7vrsslW6tqCwr7mrp3F3fR71 )
logo-defiant (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWT24j5vgHj6W8n-1hH3pPjLHW6G5rDL4_cJ3rN7bK2ZZ3kWDcV1-WJV7CgFtJW2_Z9q23W6sS4W50gVTq41LJD7W4v_Kb22_PJRpW4fZTMH1H5pTSW7X0cQg3h-QNXM6Q5LNJ33SDW4wGVDg8vyyC9N6_yrtndwh_3Vwv8Ck5y95d-W8d3VnB4xrf-pW5gmKwg74xkGCW2PCC5X5mhXgnW4G1slp16m-kYW43wsfP964bLnW6z6-HD6yMh_QW3JgJP9512JLS3p_X1 )
Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States
Unsubscribe (
https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFf0W9h3FCY7sqM3CV25Bfw6lScBHN72fQ17WVkTCN5ccSTYXk_7QVbwdhg4ngxwsW3JPVV-8mWkZPw6M1fPj77_2&v=3&_hsenc=p2ANqtz--myAwPNE6c6J5-lUyBMfFI3DFHqM00dotXt7K9ZKFwQWdGY4fAzK6zBq4Od8xeXRSVJNviEQ58j44_kT_MQMKmCe4y6A&_hsmi=260528577 )
Manage preferences (
https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFf0W9h3FCY7sqM3CV25Bfw6lScBHN72fQ17WVkTCN5ccSTYXk_7QVbwdhg4ngxwsW3JPVV-8mWkZPw6M1fPj77_2&v=3&_hsenc=p2ANqtz--myAwPNE6c6J5-lUyBMfFI3DFHqM00dotXt7K9ZKFwQWdGY4fAzK6zBq4Od8xeXRSVJNviEQ58j44_kT_MQMKmCe4y6A&_hsmi=260528577 )
You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Wed May 31 2023 - 15:04:38 CEST