Attackers could elevate their privileges to that of an administrator.
Wordfence-Logo.png (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2ZqT3l5QzW5BW0B06lZ3nyW2N406q1j2VZ_W22V6NZ5sZlBkN5bFZr6dfH-VVhdd4p14B0DyW3c0px08hBZ85W1v5mKt4Wr_8yW75ZT798WNKQsVWFRZK2rRzVjW4njzk61D-w0VN5r64_1Md6rhVN1VCh5kb3gPVtyf6q7nLjZQVRr3SB1yR4tzN7mFZN7Q_fXqW1psnxf8pZ4GyW2x6C0g3wR0_8W5rJ9Tq3cs9l-W24vx2q87MgGxf3z0gz-04 )
FeaturedImage_Wordfence_26.04 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zqz5jGjMW50kH_H6lZ3mgMdHSpJrNvmyVWCRy21-XDrpW43nHhJ8xvLp9W8tyLBG1Gq5N0W8Y6y795jjsqSW2XPPJ562yJs6W4KsBwF5t-tyXW8qb9Rq26nWHSM23tmdq4WMTW32Kd546zDBG_Vk6H6h9l8FZsW6gvwRJ4z3CpNW6QZRcW2XMkthW28QWzv3HgqP-W43XkMJ6zq0YKW4dJvHk11Qfm1N22Wb-p4mfFpW6j2W0N90z2nlW3fHHPh7Q0Gc3W1WVbH45-DBgBN7jCQ2xMLfWjVnw9rX94TFVtW4FsBW456K0wdW61JFTr34MsHsW6SSRcL33lFCXW3StjYw4CdFslW4-4tpZ7QXzZxMZhXDNPwVDNW22bz1F312_M7W7HL2sy25_cPgW6Ylnxn2d_CkNW17p_4N27-214f8kBtbM04 )
On July 9, 2023, our Wordfence Threat Intelligence team identified and began the responsible disclosure process for a Privilege Escalation vulnerability in weDevs’s WP Project Manager plugin, which is actively installed on more than 10,000 WordPress websites. This vulnerability makes it possible for an authenticated attacker to grant themselves administrative privileges by updating user metadata.
Wordfence Premium (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zrs3l5QzW6N1vHY6lZ3kvVnlKLT4j3qnqVxv0FG76-QGYW5T7X6Z4g8zKgW4Pr3Lg7DT2bRV49QvQ8VKLmlW7_C48c61dNhhW2dWdbL3BdSTKW5dkKc920PRxRW7LRvxD3r5rZxN3q8CrLxTFVtW3TSx867bpY3KW47QF1L6qYgBqW3cQWsS1DGMZRW1c8pDm6sZhg4W1-RsTZ3Kr-TJW3KG79w6r0l09W2T6Dt44vcGLYW8Jbk0r7FdHVsW29vLhL8kj2KYW7WbLHT8xv8-jW4XPS7G2Z4mD-W85_MbG3964n2f7-602H04 ) , Wordfence Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zrs3l5QzW6N1vHY6lZ3nJW7ySF2b2rL-xGN8qnwP8B7qD2W173Gjm7fj_nlV-kkXq94w974W5JyHX72l0RPhW6PBpqD5FlcCNW5D_qq29cvLCRW3RscMD4t4PQmW3cdyNb7LYt3gW6G_CsQ4XgjC-W22tmLd8RdpSFW1K1q0X485vpFW3Wt-_48sfwGWMpJ9vGJ_yW2W6Jh0Fj1Syq7lW2LPPZM3yxxk9W8VwPxd1hKmMwW7s_y9j6DR-S7W44NDK83SKhWHW6cpv9r9b3hHSW8CmVK76ZHpQRW5_960N8MJlx3d5VH5P04 ) , and Wordfence Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zrs3l5QzW6N1vHY6lZ3lyW6H7dG835ycMqVnmLLH4hVQC2VJd5MG1TRY2PW4_hJhX6WStPCVnJg5n6bqHKXN27SpNTmbpmlW3mcJ2V1pnX6gVM9RqQ85x93wW4fMBMr6Hl17jW7QM1GY1RnJfsW8whHP58y_8qJW8VTmH93xpR9tW2SF_dM1BhB4JW3TT39Q7bX5C4N6bhW872KlmNW3X08Ys9bfYyWVHyW287bHw5lN8-yKTjMVvLgW1xSwnS27XNwQW8yT9CD1DvRPbW2jF56m3YwxzdW5-zN0k3FnM59dvg6T404 ) users received a firewall rule to protect against any exploits targeting this vulnerability on July 13, 2023. Sites still using the free version of Wordfence will receive the same protection on August 12, 2023.
We contacted weDevs on July 11, 2023, and received a response on July 16, 2023. After providing full disclosure details, the developer released a patch on July 24, 2023. We would like to commend the weDevs development team for their prompt response and timely patch.
We urge users to update their sites with the latest patched version of WP Project Manager, which is version 2.6.5 at the time of this writing, as soon as possible.
READ THIS POST ON THE BLOG
(
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zqz5jGjMW50kH_H6lZ3mgMdHSpJrNvmyVWCRy21-XDrpW43nHhJ8xvLp9W8tyLBG1Gq5N0W8Y6y795jjsqSW2XPPJ562yJs6W4KsBwF5t-tyXW8qb9Rq26nWHSM23tmdq4WMTW32Kd546zDBG_Vk6H6h9l8FZsW6gvwRJ4z3CpNW6QZRcW2XMkthW28QWzv3HgqP-W43XkMJ6zq0YKW4dJvHk11Qfm1N22Wb-p4mfFpW6j2W0N90z2nlW3fHHPh7Q0Gc3W1WVbH45-DBgBN7jCQ2xMLfWjVnw9rX94TFVtW4FsBW456K0wdW61JFTr34MsHsW6SSRcL33lFCXW3StjYw4CdFslW4-4tpZ7QXzZxMZhXDNPwVDNW22bz1F312_M7W7HL2sy25_cPgW6Ylnxn2d_CkNW17p_4N27-214f8kBtbM04 )
Vulnerability Summary from Wordfence Intelligence
Description: WP Project Manager <= 2.6.4 – Arbitrary Usermeta Update to Authenticated (Subscriber+) Privilege Escalation (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2ZrM5jGjMW7lCGcx6lZ3pxV7WYDx2XKJ2CW8LJXF64K485zW4vmm0c26w_wbW7zy4ML9gNJjzW2ZlrWN788z1bW3jZY-t5Chn0RW5y7F_l2McQZ-N1qPqJLnKDRnVKwdmL7dfPlvW6l0HRP9bNdbwW9fhFr31GdfBFW5_pMKV8ZhlkTW4b9wjR7qTz3NW1KM9r-4FWryRW1c41h16-D5QsW8RZxqV3jHWFfW6Vgdtx1LVTRxW5pY3l656dC2bW6nwcvh8DPq9SW4kCw7N7P9RvSW3tkZbh50vGhGW109dCC7rd75SW1y7twr6yk09BW8skCZl4M-Mj0W2s31LB6xHwC6V3_rJz4h3nwCVNc5NH7WDzp9W4XyMHn3V9-tmN4KHc35RNMWtVQdXbY7g28frW2JTjK35S791CW2TvjDz6mgkTKW62hQ9G6gW4WzW7V7BZD7crk7dW2q6XF-76lwbPW5Gp7gV3-wxL-W9g4bY68Hd8M0W59ffGr8XHrXsW7Tv-Yp1zKVgfW6mPLz11v2wxJf5mB3r204 )
Affected Plugin: WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts
Plugin Slug: wedevs-project-manager
Affected Versions: <= 2.6.4
CVE ID: CVE-2023-3636
CVSS Score: 8.8 (High)
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Researcher/s: Lana Codes (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2ZrM3l5QzW7lCdLW6lZ3nxMd0B3Xnh4gSW45rJMY1v44RQW2LgQnq2Vn1jTW4M28b25N8z7MW7127_m2BNnZLW8TXnCQ4GNlhCW3RKQ0k6VQrJHW7Tc-qy1mDmgXW8cWzWx3pp-LsVt-HVD2nZl0pW4l4s_r7YnlqQVBCJhd59rTk_W6Kh3VM6g5p5wW3b7ZKD1qbp1rW308Jpy13wmj9W3PzRjN4ZnZGXW8b_qn078J7d8W4LTh1-1R7hq2W7kFyFF2LPS9NN2NWG_r2cT5sN59pTyThxrhjW7v5hlV8mpj3nVw644D6XmJTfW75dm2P8f6CC8f4TK4pl04 ) and Chloe Chamberland (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zs23l5QzW7Y8-PT6lZ3pFW8R5QFd9bgF5bW92lrkL1mqk4VW28g4qB81WZdyW8Z9K283MMfFkW8Q27T_3zGRdDW7p8z_t7J40jqW8J4Bb_5L9G9BW70FJt35znnfpW7gGHrJ1_xl99W2pXWYh7tPhx2W3rRw-G7c3CgtVMWYyR6cpYt2VlnJZK6_BpfsV6cThc8mZ1xxW85XZ2G8t6MlzW59v7fR59Nv36W8PM7-m1y7QMgN7mGJlyFWz7WW6GTsW71650gmW3P6mrT92dc3bW89ypfZ8GJPsMW1FRcG07H0LShW6lB3r02lBSXlW69Rl8p6rM2k7N313Ylv5G3QKW4_MJqr4YJWF0f1YYfkK04 )
Fully Patched Version: 2.6.5
The WP Project Manager plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.6.4 due to insufficient restriction on the ‘save_users_map_name’ function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the ‘usernames’ parameter.
Technical Analysis
WP Project Manager plugin is a task, project, and team management tool for WordPress. Upon closer examination of the code, we see that there is an API endpoint, the ‘save_users_map_name’ function, which updates a user’s github and bitbucket username.
[View this code snippet on the blog.] (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zqz5jGjMW50kH_H6lZ3mgMdHSpJrNvmyVWCRy21-XDrpW43nHhJ8xvLp9W8tyLBG1Gq5N0W8Y6y795jjsqSW2XPPJ562yJs6W4KsBwF5t-tyXW8qb9Rq26nWHSM23tmdq4WMTW32Kd546zDBG_Vk6H6h9l8FZsW6gvwRJ4z3CpNW6QZRcW2XMkthW28QWzv3HgqP-W43XkMJ6zq0YKW4dJvHk11Qfm1N22Wb-p4mfFpW6j2W0N90z2nlW3fHHPh7Q0Gc3W1WVbH45-DBgBN7jCQ2xMLfWjVnw9rX94TFVtW4FsBW456K0wdW61JFTr34MsHsW6SSRcL33lFCXW3StjYw4CdFslW4-4tpZ7QXzZxMZhXDNPwVDNW22bz1F312_M7W7HL2sy25_cPgW6Ylnxn2d_CkNW17p_4N27-214f8kBtbM04 )
The most significant problem and vulnerability is caused by the way the explode() and in_array() functions are used to ensure that only the ‘github’ and ‘bitbucket’ meta values can be updated. Unfortunately, these functions are not sufficient to prevent exploitation, because they can be bypassed with a special character, known as a homoglyph, that acts like an underscore, however, won’t be properly “exploded” but will be saved in the database as a proper underscore.
This made it possible for authenticated users, such as subscribers, to supply the ‘wp_capabilities’ array parameter with any desired role, such as administrator, when updating what should be username metadata, which would grant the user access to capabilities based on that role.
As with any Privilege Escalation vulnerability, this can be used for complete site compromise. Once an attacker has gained administrative user access to a WordPress site they can then manipulate anything on the targeted site as a normal administrator would. This includes the ability to upload plugin and theme files, which can be malicious zip files containing backdoors, and modifying posts and pages which can be leveraged to redirect site users to other malicious sites.
Disclosure Timeline
July 9, 2023 – Discovery of the Privilege Escalation vulnerability in WP Project Manager.
July 11, 2023 – We initiate contact with the plugin vendor asking that they confirm the inbox for handling the discussion.
July 13, 2023 – Wordfence Premium, Care, and Response users receive a firewall rule to provide protection against any exploits that may target this vulnerability.
July 16, 2023 – The vendor confirms the inbox for handling the discussion.
July 16, 2023 – We send over the full disclosure details. The vendor acknowledges the report and begins working on a fix.
July 24, 2023 – A fully patched version of the plugin, 2.6.5, is released.
August 12, 2023 – Wordfence Free users receive the same protection.
Conclusion
In this blog post, we detailed a Privilege Escalation vulnerability within the WP Project Manager plugin affecting versions 2.6.4 and earlier. This vulnerability allows authenticated threat actors with subscriber-level permissions or higher to elevate their privileges to those of a site administrator which could ultimately lead to complete site compromise. The vulnerability has been fully addressed in version 2.6.5 of the plugin.
We encourage WordPress users to verify that their sites are updated to the latest patched version of WP Project Manager.
Wordfence Premium (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zrs3l5QzW6N1vHY6lZ3kvVnlKLT4j3qnqVxv0FG76-QGYW5T7X6Z4g8zKgW4Pr3Lg7DT2bRV49QvQ8VKLmlW7_C48c61dNhhW2dWdbL3BdSTKW5dkKc920PRxRW7LRvxD3r5rZxN3q8CrLxTFVtW3TSx867bpY3KW47QF1L6qYgBqW3cQWsS1DGMZRW1c8pDm6sZhg4W1-RsTZ3Kr-TJW3KG79w6r0l09W2T6Dt44vcGLYW8Jbk0r7FdHVsW29vLhL8kj2KYW7WbLHT8xv8-jW4XPS7G2Z4mD-W85_MbG3964n2f7-602H04 ) , Wordfence Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zrs3l5QzW6N1vHY6lZ3nJW7ySF2b2rL-xGN8qnwP8B7qD2W173Gjm7fj_nlV-kkXq94w974W5JyHX72l0RPhW6PBpqD5FlcCNW5D_qq29cvLCRW3RscMD4t4PQmW3cdyNb7LYt3gW6G_CsQ4XgjC-W22tmLd8RdpSFW1K1q0X485vpFW3Wt-_48sfwGWMpJ9vGJ_yW2W6Jh0Fj1Syq7lW2LPPZM3yxxk9W8VwPxd1hKmMwW7s_y9j6DR-S7W44NDK83SKhWHW6cpv9r9b3hHSW8CmVK76ZHpQRW5_960N8MJlx3d5VH5P04 ) , and Wordfence Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zrs3l5QzW6N1vHY6lZ3lyW6H7dG835ycMqVnmLLH4hVQC2VJd5MG1TRY2PW4_hJhX6WStPCVnJg5n6bqHKXN27SpNTmbpmlW3mcJ2V1pnX6gVM9RqQ85x93wW4fMBMr6Hl17jW7QM1GY1RnJfsW8whHP58y_8qJW8VTmH93xpR9tW2SF_dM1BhB4JW3TT39Q7bX5C4N6bhW872KlmNW3X08Ys9bfYyWVHyW287bHw5lN8-yKTjMVvLgW1xSwnS27XNwQW8yT9CD1DvRPbW2jF56m3YwxzdW5-zN0k3FnM59dvg6T404 ) users received a firewall rule to protect against any exploits targeting this vulnerability on July 13, 2023. Sites still using the free version of Wordfence will receive the same protection on August 12, 2023.
If you know someone who uses this plugin on their site, we recommend sharing this advisory with them to ensure their site remains secure, as this vulnerability poses a significant risk.
For security researchers looking to disclose vulnerabilities responsibly and obtain a CVE ID, you can submit your findings to Wordfence Intelligence (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zr83l5QzW69sMD-6lZ3n_M9WMkqG4YNQW1XV1HG7h2bfMW3CKq5F3VBBb4W88XJyq6rhvP9N7Y_JD_kfw__N3lx2gGh7bXrVLBzZL1WMCkhW1RnWXp3CSZ-TVD7_8K89XJHnW6fnT4N5zwmGlW4LTBLH8TrcCPW2p23MF5bsXbZW63tcMW2z0T5sW4R2WS242cS1LW5Th7Hv4yGz3JVRjzYz3STTdNV-lzKH7x_x3XW2Hb0Xr6hyZcqW95zV__8xFzx9N4jhM-5b-Jw4f8NVQhl04 ) and potentially earn a spot on our leaderboard (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2ZrM3l5QzW7lCdLW6lZ3mVW52ckfb1Fjx9LW2vqBJr4dQShKMkbFvPssZD1W5KZ-853FpmSLW32FKcd4f5Bb3W5MW8mn5_Gkl1W1hwwDr8pkZyCW5X1-Fm149dHjN1Xszqjr0zykN66pPvXFRYT1W1G_j9F1n6zfZW2z0kwX2gkQFgVHllZK3wvLwkW3M1y6v1qyYnKW92BbLk7xttk6W8bktcc7yr3JBW3wzZxz7bs8xYV6Sdw47v8QKpW6RZjPh1_DMZpW99wKHB8SdvmlN97mJ9dvVrCXW2Kyh2l960ptbW1pKr-X16HnvZVFkBzq4Z6YYnf2VRgdW04 ) .
The Full Product Lineup:
wf-stacked-free-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zr83l5QzW69sMD-6lZ3n1W67xDgy43nn_3W2ZhwfS4gBqbtW5D3FDW3D4Rb3W51ZY572dPXJyN1kHVZnr2pfGW5R9dFW5qdlvZW50cwpD62f4Z9W5MY6s58N1RN-W8cw-km8FkPCrW5DZjD296jf78N8ywyJG2_-DJW1dFzwj61XskzW7P_V3X6-TWQcW95B5w24CcqmYW7hGL5d83VTkLW7KtyLf6grqWZW8q4CFh7f_c8qVHm_FP8LL9RKW3DGgTN1rG1BHW2NfBRx69fYhjf9fy-qH04 )
wf-stacked-premium-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zrs3l5QzW6N1vHY6lZ3n1VZNL7x2NT68LW6zqty77T87tgW1Sghtb45dZhhW3pjB0b3cVX1xW5QpKW55f0GR_W92KWpY8LwXjnN3pF5Bp7vHt2W7RdC3G4fwHjTN5f2kX0nQRnLW3gRJlY3NbDzdW19ZZhP2QsxTLW7zhSjr28JCv5W3HFswY77Ls65W3QXwP35cs_SkW3jGglQ4MkKlWW5cT0-242HGn9W8-b5Sd969fDXW8DFjhR1-sVzkVvdfsh4tgy3NW4-6yR68RzjTlW4FL0hd2fhlm2W365fz56dj8Ysf2c7sz-04 )
wf-stacked-care-3 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zr83l5QzW69sMD-6lZ3nBW4n3vrZ6QJ87SW6hKsgs8r6GRRW1ZQw9R4XPwC_W4csGd62DtS_qW5sXDMl2Nv8KvW1vGrzL5p_tC6VpLzgX2x-ydtW3JCDbM1z8fQKW2dYB871vNJvgW5cX8tG91M2JXN87xYXLSJjS9W4wL5vS1BCBsRN23xDSLbn3qsW1X0tMb5XB7t6W1qP35V84fkp_W1QsYFQ6JXH1HW2RD_jL7-cT6QW76QVR-5Z3k7lW8VG7sP3c-4jjW9lcy614sG0xtf5v_ljC04 )
wf-stacked-response-2 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zrs3l5QzW6N1vHY6lZ3lyW6H7dG835ycMqVnmLLH4hVQC2VJd5MG1TRY2PW4_hJhX6WStPCVnJg5n6bqHKXN27SpNTmbpmlW3mcJ2V1pnX6gVM9RqQ85x93wW4fMBMr6Hl17jW7QM1GY1RnJfsW8whHP58y_8qJW8VTmH93xpR9tW2SF_dM1BhB4JW3TT39Q7bX5C4N6bhW872KlmNW3X08Ys9bfYyWVHyW287bHw5lN8-yKTjMVvLgW1xSwnS27XNwQW8yT9CD1DvRPbW2jF56m3YwxzdW5-zN0k3FnM59dvg6T404 )
wf-logo-intelligence-h-800 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2Zr83l5QzW69sMD-6lZ3kBW673dPC8jgzGLW8R7Rq818BW87N2dPv1_8n3-cV41nSn2vzHdnW6PDtFJ1JYr6yW1vXRnZ8hB8svN1VLMxh5WVJzW1tp3Sp5js6BmVSskld6nSNg8N1ZbcptvjNlxVsVV1L8Kkd_SW2yXgLw10fT3jW86mCyV2yBbw4W3j8Srr31nHQPN7T-GTplCK0JW6sbc691sc_0zV4gY_S6-92DFN2JF4lBk_SjtVs6L8-4XvWP8N7Plg_6c4PCsf3BxMHs04 )
logo-defiant (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVNLSd6hybXKVFC5zC5cMyK3W3V7XmG520cK3N6L2ZqT3l5QzW5BW0B06lZ3k_W4RRL8X1WnQp1N2q0_nB_dnZcW3GYH4S8XVGf0W4qlk9K12XJRYW3wHjCy5cKCVHW2btx2y52ypjWW8HGV2575ghqpM8cNz6ThM90W8165r12qbWM8W1l_JNk3LMb2JW5-tkdH1FNBxbW6jrm9G8VRqHcN37tPwnjV8tYW1yqBnP1S75YHW414LP-67_g1pW7Nks2q36D6H3W6bxK6J3GST-0W1txmbH8q5S9Df3wF2sM04 )
Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States
Unsubscribe (
https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcPlW7SrnGF5klZVlV25rVv6vCJ77W5-Zzpb6MlhpFN5M8bVL1yf0NW2_-VKW3PVLbtN5LQH8BRRl0Hn1KCNf7483&v=3&_hsenc=p2ANqtz-_v0kZpAu6faMvBMEIIIeIHpJ-xX6hQ5smhRa_eMLciBDhW8XWfZYr9nUjsWHpcC6M0BOc4L2p9hc5xsTWO9nHe0u1-Xw&_hsmi=269666000 )
Manage preferences (
https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcPlW7SrnGF5klZVlV25rVv6vCJ77W5-Zzpb6MlhpFN5M8bVL1yf0NW2_-VKW3PVLbtN5LQH8BRRl0Hn1KCNf7483&v=3&_hsenc=p2ANqtz-_v0kZpAu6faMvBMEIIIeIHpJ-xX6hQ5smhRa_eMLciBDhW8XWfZYr9nUjsWHpcC6M0BOc4L2p9hc5xsTWO9nHe0u1-Xw&_hsmi=269666000 )
You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Wed Aug 09 2023 - 20:32:22 CEST