[WordPress Security] Stored Cross-Site Scripting Vulnerability Patched in Newsletter WordPress Plugin

From: Wordfence <list_at_wordfence.com>
Date: Wed, 6 Sep 2023 06:30:50 -0700

Cross-Site Scripting vulnerability impacts over 300,000 WordPress installations, can be used to create malicious admin users and webshells

Wordfence-Logo.png (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbsT3l5QzW5BW0B06lZ3pkW6BwnfQ1_fs4bW5HHdwP5VT0dTW4TsT0y2-jYBqW36s8dr8ZcxYkW63pzbl5_SZ_kN5jPgz5g9x_9N6ldpD1ZYFcMW362N2D4LPBt4W6757Kd1yWGjBW9bY5s155l-VhW1vdvl_7mj11HW89J04H69HmhGW4xY4cd7qdXjDN4WH6mv6SjQLW5N0sFz38s7dnW10lRRs4CkL5LW2d3kw23t5Bv2W3m2smM78PNNFf2VMPDY04 )

FeaturedImage_Wordfence_32.04 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbvF3l5QzW95jsWP6lZ3mVW7mMBLg33HpGzW8f8PbL96zXg_VQ9wxJ6Q5D-kW7s4X5s1NByYdN6yWGtrmnkxQW70H0Jb5Zr1RdW9h3wqg3kbVs_W1phLwq5Y1XHHN1rGCdf1mvgZW8R-YQW83NZkYW4bN7_F2MDrWSW1rnpHS3fQtXKW8NQ3L_6zTWbKW1zd-t85jHw9zW7VRtKc3H-PL3W2W_s-t2cgBtwMqjGyBl1fPjW2SNBBR78X3SDW6vbj5P6Nzw-MW5Fq_Qm2gBrmKW8Ns-Lr4zSJ-YVpz5jz5YRXqJW8GwkWx3RS3_vW22Bn0k2tvv5xVwz5PG5L0JJrW76kyP64j490SW9bPmYt6L4fV2W6N7LZ14TxH9-W1gpn_Q55y2LWW6H9VzX7mCGV5f1T8kFW04 )

On August 16, 2023, our Wordfence Threat Intelligence team identified and began the responsible disclosure process for a stored Cross-Site Scripting (XSS) vulnerability in the Newsletter plugin, which is actively installed on more than 300,000 WordPress websites. The vulnerability enables threat actors with contributor-level permissions or higher to inject malicious web scripts into pages using the plugin’s shortcode.

All Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbts3l5QzW6N1vHY6lZ3pHW23R-8c94jR9xN4vxRX-snD4tW8Q-TBv4np8H1W3rB0XQ5rN6JPW8q91J66xz3lhW2X6tL514x05rW2vRjnT6zcxT8W8V1-bd1CQjbXW7h8TPD3kVqLTW3zP7Qr80zT81W6KPM6S8PDJjpW1KM6zP22SMWZW5BFqS88LHwFkW5s0v5N1-S1DLW8H9RDC7dNhQjW48TjTF5c_S68W7k0b8r8tH9nHVHFvp54s_pR2W6rDYdQ4Wg3CCW1j_v_S9fC05HVl9yK97_J0LZVSPmrx7qGWtCf6t0MGT04 ) , Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbts3l5QzW6N1vHY6lZ3psVnt05G1RPkfpW1VSTQb6w0N6HN8R7rZ-RZMXmW43yNCm61RMfXW4QTHPm1tbcz0W1lJ9sf8YNyz-W2T2rGy14GjpjW7ZfFz43lWGJ-W1HcV6g39W6F1W6Pslqt2_SPgKW5CkQxK5cn2qRW10DYsV9jsmTcVbHN-H4YtWcdW2_qpGL6WLVPhW7h_X3G9cZY8XW8PY09Y9bTdRxW59vf8V8GylKWW619MM94F6XX5N9fxF4kdDq_XW6GvN4_7BW6CBN5xrR93dJNXhW4NFV-p7qp0Wxf2FTdgR04 ) , and Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbts3l5QzW6N1vHY6lZ3ppW7bCZyL7cTWjrW31MTT65cPHvjW7PL7bf1sXC3cW2db5Z062GyGqW8KMhzt6zt06SVz2N4X5_HsBWW6nSss13pSVQfW6tBcSH29yz2HW5smgp457MTt8W8GKfMQ3hWYw8W8303nz4kb04NW4VH53t6_kPKzW9gxxSS7SbhS0W9lB9_q57qHLXW35b1567-L-j7W1FTHmb232wKNW3MmZ2c29bPTRVRR-GJ1zfDgcW7ghBN934fTjVW8pR4jl1NkZ-9W1xDqFC2LVpsbW4VqRlr3y4hwpf310hxd04 ) customers, as well as those still using the free version of our plugin, are protected against any exploits targeting this vulnerability by the Wordfence firewall’s built-in Cross-Site Scripting protection.

We contacted The Newsletter Team on August 16, 2023, and we received a response on the next day. After providing full disclosure details, the developer released a patch on August 17, 2023. We would like to commend The Newsletter Team for their prompt response and timely patch, which was released on the same day.

We urge users to update their sites with the latest patched version of Newsletter, version 7.9.0 at the time of this writing, as soon as possible.

READ THIS POST ON THE BLOG
(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbvF3l5QzW95jsWP6lZ3mVW7mMBLg33HpGzW8f8PbL96zXg_VQ9wxJ6Q5D-kW7s4X5s1NByYdN6yWGtrmnkxQW70H0Jb5Zr1RdW9h3wqg3kbVs_W1phLwq5Y1XHHN1rGCdf1mvgZW8R-YQW83NZkYW4bN7_F2MDrWSW1rnpHS3fQtXKW8NQ3L_6zTWbKW1zd-t85jHw9zW7VRtKc3H-PL3W2W_s-t2cgBtwMqjGyBl1fPjW2SNBBR78X3SDW6vbj5P6Nzw-MW5Fq_Qm2gBrmKW8Ns-Lr4zSJ-YVpz5jz5YRXqJW8GwkWx3RS3_vW22Bn0k2tvv5xVwz5PG5L0JJrW76kyP64j490SW9bPmYt6L4fV2W6N7LZ14TxH9-W1gpn_Q55y2LWW6H9VzX7mCGV5f1T8kFW04 )

Vulnerability Summary from Wordfence Intelligence

Description: Newsletter <= 7.8.9 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbt85jGjMW69t95C6lZ3lWW4fPWXs2QwnRmMgRFGGDV436W7-86pj50NWy4W8rbJHn58NSPxW7cpY5x85rD7VW3msxH48YmHZHW4N9PTb271P6NW61bgy49kRT06W8cZJ_b3dfSzNW5DTcrf930MYQW8gsnjz32_rs3N2PQgN27Tg4hN2YGk9fXdrB-W3nz4wm6V81hDW95mZ8V113s0FW4wtV437sNPg9W3_TS108vYnVTN2w1Ty0Hgl2RVTmD1w1NXT5yW6SK4Z-3tnJ-HW1mGD0D8V3hlhW15Mg4M7PJMyGW8K1M-Y4q4WHsVvKtcJ6pP1nlVzZ20Y3XN3dyW5b4FpZ2fxM5LW6z0r0P2tpTBWN1Wv_v9ptt5TW4_R-qM5fTykCW5fxXkK5FJZWJW4ZvGYs2Dv8y5W54_qzf5-x88gW58srnd7MtNh0W2xM6nn7r9vhbW5mlF6l1LMxJlVXSD5d5vNg4Yf7N1rd-04 )

Affected Plugin: Newsletter – Send awesome emails from WordPress

Plugin Slug: newsletter

Affected Versions: <= 7.8.9

CVE ID: CVE-2023-4772

CVSS Score: 6.4 (Medium)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Researcher/s: Lana Codes (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbtM3l5QzW7lCdLW6lZ3pLW4BzNtq7bLJG0W1Y5-183BwYtYW7lwHK759wvVDW6TMBXL1RsMq8W5fDTHt566WrCW77t7br4R3M-LW51XRm261k1qhW89BKGL6P1V_tW8_2BBN4mmXgjW2zh_Yr2fPVxbW6z8DPS7BHp8YM96C5KqWGFRMT1JzXHC6mpW1_tSjw7rcsmmW531bv77229hxW1GwgSV80cgSZW7bPCsY6vxFg5N9621dvP-tfQW1SdLFJ8wXJzsW5tVBQj1J2z4_W2F8sQQ969-4MW4Fdr978Kr47qW9hHh9Z2LQVDBW2md81r2yNnCrdttqS204 )

Fully Patched Version: 7.9.0

The Newsletter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘newsletter_form’ shortcode in versions up to, and including, 7.8.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Technical Analysis

The Newsletter plugin is a newsletter and email marketing system, with a drag and drop newsletter builder and many other features. It provides a shortcode ([newsletter_form]) that displays the newsletter subscription form when added to a WordPress page.

Unfortunately, insecure implementation of the plugin’s shortcode functionality allows for the injection of arbitrary web scripts into these pages. Examining the code reveals that the shortcode has two types, one of which is the get_subscription_form_minimal method handling the minimal type in the NewsletterSubscription class. In vulnerable versions, this method does not adequately sanitize the user-supplied ‘class’ input, and also does not adequately escape the ‘class’ output when it displays the form. This makes it possible to inject attribute-based Cross-Site Scripting payloads via the ‘class’ attribute.

[View this code snippet on the blog.] (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbvF3l5QzW95jsWP6lZ3mVW7mMBLg33HpGzW8f8PbL96zXg_VQ9wxJ6Q5D-kW7s4X5s1NByYdN6yWGtrmnkxQW70H0Jb5Zr1RdW9h3wqg3kbVs_W1phLwq5Y1XHHN1rGCdf1mvgZW8R-YQW83NZkYW4bN7_F2MDrWSW1rnpHS3fQtXKW8NQ3L_6zTWbKW1zd-t85jHw9zW7VRtKc3H-PL3W2W_s-t2cgBtwMqjGyBl1fPjW2SNBBR78X3SDW6vbj5P6Nzw-MW5Fq_Qm2gBrmKW8Ns-Lr4zSJ-YVpz5jz5YRXqJW8GwkWx3RS3_vW22Bn0k2tvv5xVwz5PG5L0JJrW76kyP64j490SW9bPmYt6L4fV2W6N7LZ14TxH9-W1gpn_Q55y2LWW6H9VzX7mCGV5f1T8kFW04 )

This makes it possible for threat actors to carry out stored XSS attacks. Once a script is injected into a page or post, it will execute each time a user accesses the affected page. While this vulnerability does require that a trusted contributor account is compromised, or that a user be able to register as a contributor, successful threat actors could steal sensitive information, manipulate site content, inject administrative users, edit files, or redirect users to malicious websites which are all severe consequences.

Shortcode Exploit Possibilities

Some previous versions of WordPress contained a vulnerability that allowed shortcodes supplied by unauthenticated commenters to be rendered in certain rare configurations, though the vast majority of sites have been automatically upgraded to a patched release of WordPress as of this writing.

Disclosure Timeline

August 16, 2023 – Wordfence Threat Intelligence team discovers the stored XSS vulnerability in Newsletter.

August 16, 2023 – We initiate contact with the plugin vendor asking that they confirm the inbox for handling the discussion.

August 17, 2023 – The vendor confirms the inbox for handling the discussion.

August 17, 2023 – We send over the full disclosure details. The vendor acknowledges the report and begins working on a fix.

August 17, 2023 – The fully patched version, 7.9.0, is released.

Conclusion

In this blog post, we have detailed a stored XSS vulnerability within the Newsletter plugin affecting versions 7.8.9 and earlier. This vulnerability allows authenticated threat actors with contributor-level permissions or higher to inject malicious web scripts into pages that execute when a user accesses an affected page. The vulnerability has been fully addressed in version 7.9.0 of the plugin.

We encourage WordPress users to verify that their sites are updated to the latest patched version of Newsletter.

All Wordfence users, including those running Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbts3l5QzW6N1vHY6lZ3pHW23R-8c94jR9xN4vxRX-snD4tW8Q-TBv4np8H1W3rB0XQ5rN6JPW8q91J66xz3lhW2X6tL514x05rW2vRjnT6zcxT8W8V1-bd1CQjbXW7h8TPD3kVqLTW3zP7Qr80zT81W6KPM6S8PDJjpW1KM6zP22SMWZW5BFqS88LHwFkW5s0v5N1-S1DLW8H9RDC7dNhQjW48TjTF5c_S68W7k0b8r8tH9nHVHFvp54s_pR2W6rDYdQ4Wg3CCW1j_v_S9fC05HVl9yK97_J0LZVSPmrx7qGWtCf6t0MGT04 ) , Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbts3l5QzW6N1vHY6lZ3psVnt05G1RPkfpW1VSTQb6w0N6HN8R7rZ-RZMXmW43yNCm61RMfXW4QTHPm1tbcz0W1lJ9sf8YNyz-W2T2rGy14GjpjW7ZfFz43lWGJ-W1HcV6g39W6F1W6Pslqt2_SPgKW5CkQxK5cn2qRW10DYsV9jsmTcVbHN-H4YtWcdW2_qpGL6WLVPhW7h_X3G9cZY8XW8PY09Y9bTdRxW59vf8V8GylKWW619MM94F6XX5N9fxF4kdDq_XW6GvN4_7BW6CBN5xrR93dJNXhW4NFV-p7qp0Wxf2FTdgR04 ) , and Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbts3l5QzW6N1vHY6lZ3ppW7bCZyL7cTWjrW31MTT65cPHvjW7PL7bf1sXC3cW2db5Z062GyGqW8KMhzt6zt06SVz2N4X5_HsBWW6nSss13pSVQfW6tBcSH29yz2HW5smgp457MTt8W8GKfMQ3hWYw8W8303nz4kb04NW4VH53t6_kPKzW9gxxSS7SbhS0W9lB9_q57qHLXW35b1567-L-j7W1FTHmb232wKNW3MmZ2c29bPTRVRR-GJ1zfDgcW7ghBN934fTjVW8pR4jl1NkZ-9W1xDqFC2LVpsbW4VqRlr3y4hwpf310hxd04 ) , as well as sites still running the free version of Wordfence, are fully protected against this vulnerability.

If you know someone who uses this plugin on their site, we recommend sharing this advisory with them to ensure their site remains secure, as this vulnerability poses a significant risk.

For security researchers looking to disclose vulnerabilities responsibly and obtain a CVE ID, you can submit your findings to Wordfence Intelligence (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbt83l5QzW69sMD-6lZ3nWW5ny8H376t4MrW3frDsf1_qv_SVjSp9s3jF94dV7tZ7J5Cf7SbW4bw-D02ZgQwvW5RfTS26-YB3FW8R2dvt5fw8LfW13X0Pz72YWYGN10Mdn2McDcgVsxl894XJB49W8rM5_X8bdZBxV-rKMX41wQJCW4sfDnL1cM2mLW6b_sQc81xdslW2LDYHm1zk1hTVm-qMP5nP55MW6gRM994D8SVkW7rshKc3vfnwSN57XgzBn12T2W8pvbhp2YbPRLf5z8f6M04 ) and potentially earn a spot on our leaderboard (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbtM3l5QzW7lCdLW6lZ3pKW8M0QZb2rxGZtW7sz2pR1dC7jgW7w5pjQ7YRlJYW7_tQD812dQWlW4v71jx90_sZgN835FPL5kMt1W8vqZhC11mlpsV-jRsg3W2b0zW6VxxQC32M040N3qYfmGKLtPBW4hWjF220qtT5N80S3ZBy8mMGW1kM2rB3ZBW1rW2_21D89g1TCKW7Tg_ys57dHpfW6b0HmF3dHBH9W1DWKdB1099cPW7G8N7m4RX4BBW9cMvxR4-WsvkW8R_fXR5Y-yS9W1Lbwcx8dSLm3W6C0N7F638PpsW6Zj63p42bmTtN3Pc4ZJtplP8f66bKMM04 ) .

The Full Product Lineup:

wf-stacked-free-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbt83l5QzW69sMD-6lZ3mYN7gf0vjkT9vNW351lQX8VJqzfVPdP8x8cb5zsW6624dx8Bqg2RW7pDbRC7ny8wCW3HP2qb3TCKLyN1ZTkbkgmCGBN47sSlLfBXz-V5K--f8HPKs_W11-v403gP6FbW6phBM61WxSGFW1Nbp133bsSZlW79jh4G7_dF8tW968D2W1jZmL8W9bbxX63M4WmjW3bV9mX9hQw3_W8ww59b3VgblwW3nr_m01Cr6VDW3qYFzQ5w646ZW6GLLYg1Bm_XPf7KFYR004 )

wf-stacked-response-2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbts3l5QzW6N1vHY6lZ3ppW7bCZyL7cTWjrW31MTT65cPHvjW7PL7bf1sXC3cW2db5Z062GyGqW8KMhzt6zt06SVz2N4X5_HsBWW6nSss13pSVQfW6tBcSH29yz2HW5smgp457MTt8W8GKfMQ3hWYw8W8303nz4kb04NW4VH53t6_kPKzW9gxxSS7SbhS0W9lB9_q57qHLXW35b1567-L-j7W1FTHmb232wKNW3MmZ2c29bPTRVRR-GJ1zfDgcW7ghBN934fTjVW8pR4jl1NkZ-9W1xDqFC2LVpsbW4VqRlr3y4hwpf310hxd04 )

wf-stacked-premium-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbts3l5QzW6N1vHY6lZ3n8W91LwTw7Qj4ylW2wjGy61nczQGW1mtW2d2-x6hdN4jN4N6fF3jfVkp7c24Tx5BSW878brY4y4NVsW21232L7v_SZpW2S8-Kw17kcx9W28hPrw46wV11W2RSHB-5qn7d9W2MkDpj5BcbTgW3zFVKP56FvZyW6W7ZkK76nZfnW4qxMJZ256xgPN5PvxGZnG4SmW8nF1C25x8W4mW7p2FLW6LQS2hW2PG5Wm3h8Ns7W10hrWs309JpxW7hQRmw2WGSGMW8W2fPk7wJzZYW1WXM8_17w5wtf3JLGQP04 )

wf-stacked-commandline-1024x901 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbts3l5QzW6N1vHY6lZ3kZW9lGtFX74K1tYW8GVMgL8pDmbWW7yMzpZ77bNpTVyv-9J5B1LDVVyZFHD1pFrzqTZCt_2Cs6TvW5QRFcV7hpZdmW5H5n3B6m-BXLN2Tqg9CZLDRjW3F2d_Y5H1hnHW2jbdx27shh7fN3K1JPhGV6YCW66_J4k8WlvLWW5cfycr4TmL47W7f5qCh5NmxPVW2GPYns6l-5X8W5Q1rql2f838XW2V1TJK3yyP68W2JmL1q1VlfKGW5KXGvL28nqpJW7f2xlG3sS85MW5Wh3CP7DFDVLf17hxNY04 )

wf-stacked-care-3 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbt83l5QzW69sMD-6lZ3mwW1ksJzH5DkCFdW7nDHDk8djG-8W60_1lp32k_Y-W12-NSw7GhcFzW853-NN8pBPBxW8xl1Q32PpR73W8bbQw82hc65_W75Z2Gv54wrCwN2FlfqDJs3YGW74fR877BLgZMW1yLTJs3VXDzCW2VSdpH1lH7GpVvKVw82kBx_bW53jKsh7lG4SsVBnFgw5nC_w8W8vGqfs5jdpwcTY7sp3vnqxLW6SS1WD5VDcV2W2K8sbT3TJDshW388Bq51mfQqkdQkkQ204 )

wf-intel-footer (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbt83l5QzW69sMD-6lZ3nLW2FFxzK57x0GhW1c7ht71LLZGHVdPrx31_FK7LW8W8xK_6ZFChMW6_fkpL10Nf8jW7pF2555hq4JpW95yfJm4lK-lkVXBk9_2_Mdf6W6qG7Wf478F9gW7jd3d64NYbmmN8cwT8-_GFDpW3c1lG55C-t5-W1l63Hw65XV-yN3MlWzzYb7KnVX8C-z3RHvV7W2Km9Q_1ZsHFdW3Zy2sy5njgsWVvBh0F4KgHfsW1lDB995-N_TrW1Z5_y897_X3-f9fD4-W04 )

logo-defiant (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW5_tb8KGVhBVfgQPK7hlmqqW3Bmyl9535NRcN1PJbsT3l5QzW5BW0B06lZ3nDW6wXRvv587kwpW5MD7rd6ddFPsN3ZZx4vjJzQzW7JX1NZ6f3VHqW2klXmp48GNjXW5xGYtr70GVrmVp2Qlq6LWJc4N6t0G-v3pvW7W7fmbH63Bz0lWW34BF-j8lDZMcN5vcJhGNN9TwW8WXQ-Y1Js8r3W5fLtZt4-NHxqW554F4L1ZV3KCW4g9WcB1clsDgW9k7SL_2G4y9sW1Jq_jV7Gr141W2_xSkt3f5Wk8f4mKd5204 )

Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States

Unsubscribe (https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcPbW7tVtk37Y6Mk-V25qXn8yp8NhW89bwrY6vKbMdN63X6qp1yf0NW305jQs4FMMkmW3HND_588__k1f8PgTJwQ3&v=3&_hsenc=p2ANqtz-8SJAGQ2oFZYPBs2KN61eJsVVTzmMq59TiMlv86XK9ACbWTmBhrkNyNdJllb_YDv3SUvLz6a3FetlgecDMej6OXMjNDSw&_hsmi=273160380 )

Manage preferences (https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcPbW7tVtk37Y6Mk-V25qXn8yp8NhW89bwrY6vKbMdN63X6qp1yf0NW305jQs4FMMkmW3HND_588__k1f8PgTJwQ3&v=3&_hsenc=p2ANqtz-8SJAGQ2oFZYPBs2KN61eJsVVTzmMq59TiMlv86XK9ACbWTmBhrkNyNdJllb_YDv3SUvLz6a3FetlgecDMej6OXMjNDSw&_hsmi=273160380 )

You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Wed Sep 06 2023 - 15:30:58 CEST

This archive was generated by hypermail 2.3.0 : Wed Sep 06 2023 - 15:32:57 CEST