[WordPress Security] Several Critical Vulnerabilities including Privilege Escalation, Authentication Bypass, and More Patched in UserPro WordPress Plugin

From: Wordfence <list_at_wordfence.com>
Date: Tue, 21 Nov 2023 12:05:33 -0800

Several critical vulnerabilities allowing for site takeover patched in UserPro Plugin for WordPress.

Wordfence-Logo.png (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Db63prCCW6N1vHY6lZ3lkW5GXMSd7ry0MQW1gs18H6zftzTW1ssNzF25KXF-N4rhz8xhlW4tW6prdLx622S99W3ZWK3B6WJl00W3D9RH91m0Kc9W36lsdN8bV9p2W2_4NsT5D8jn-W4VsNm45R3lj4W9k13-S6VYQyKW39lDC082y0CgW1_MdnX1mGFQbW4DnXvH7wcz9mN58sm_fr4VMyVV4RJQ5vxwhqW4pgkCz371d_XW8yhnWj2659zkW50FGvb2jbY7HW2c55FP4vS0_DW1VNp4d67wxpyW6cdWrD8y7ZRsf1wV99z04 )

FeaturedImage_Wordfence_53.051 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq5m_5PW7lCGcx6lZ3pKW3BG0bc7zvg-2W5dc8pP8tDnr4W4bx72J3YvvCwW5nZ7YH1sfP6MW6qTZX95dN4Q3W8xbHrm35XqRNW3yyz4x2MLWLkW8wcch62gzW1TW3lV7KS7YD8MTW5LNXSW8hgwxlW4NrYyQ570m2VW7mmKmp118CytN6FGVfBR-CySN6W7VmvtRsTSW1-CVCk6y2gTCW7w8dDK4YWtvkVRl-yT8cDTTYW1RnHR24P-z8XW5wQYwx6c3dLSW2ssQCF51FBkgW4t8w678tMHhQW1bQr563hcNMzW61Pspn7Y10MhW4930gJ3YGbJFW4QwfpF6jhMKGN8n-Mbj6rb9KW9gN0ss71jtqCW2SXQyT85M0cgW1WGHPc793N8FW4dkYks4DtQ6kW1_L03s2zx7F_N7fCDQ09n2cjW68Bjpf7HB5ztW2B5T_y833frnW2pfmrn6lBH2jW6-3D0t5-pDypVdmKk13Ts5SdW5C3mYj4f_Zt1VRm6V06-VqcFVPM9wL5NGgJpf1txY9204 )

On May 1, 2023, the Wordfence Threat Intelligence team began the responsible disclosure process for multiple high and critical severity vulnerabilities we discovered in Kirotech’s UserPro plugin, which is actively installed on more than 20,000 WordPress websites.

Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_DbK3prCCW7Y8-PT6lZ3pxW5tD6D51gwZ2tN4gfk0hcwl35W7p2RnY818j2tW2dlTYS8ffR2sW4pfTYJ4h3_XTW764Psj3V0YWpW1DPCW687By_vW2CrYt-80Tf2FW6bQkgQ8tSrsFW5Csj182hkGNjV5ZqJV2lFV-xN1TwY-jyLD1YN7x8JdqFyMmPN5-bP8R7jRTmVr4VYF7sm7nMMbjv4dDxH1rW7Xyc_R6fs5H6W47l7FB7_mhhkW8DbmCq8bSPcsW1rzMYs6-r56VW8dss985M5kvBW3SWpW73_yY_VW4fKRCd5fg8QHW8S6gqH4RmZ6SW5c1W5794yrSHW17bd0W93BcHPf8b_5tT04 ) , Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_DbK3prCCW7Y8-PT6lZ3p5W643B_b8js-7dW833m4J6F2m5PVSP-WD5m2DVSW2139mz3xjlPhV5F_s55jbCxgW3jLJcp3Y21Z2W94_1yQ2WYljbW11-vX463rwnhW44DFRL7bbq1SVJQrNJ7FSzXsVj-wDR8FL83QW2K0zqb83xmWKW7xZC-z3hM007W1Nmn0_6yJrNjW8nz--42S7sNGW1y_s5d227Hs1W2GjZZx1lRK8BW4N5Y0k7pPP16W9cmFQ520gGrYW5PDXbH6Z62hrW52bXrt7FJtDGW3NfrpV1lf-n8N3H0GWNpn67pN3PppZbPqlg6W89tYgp1qJWzvW15bHQ86CKdbnf1pxTBT04 ) , and Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_DbK3prCCW7Y8-PT6lZ3ptW8bGngP4Y9rj9W4g_9_b7wWkGsW5Y7lw47Lzb52W1vvZ3x6JvvllW5s0ytr7nLMgRW7CDJwF6hG7MWW3CJ4qT9hdrDZW3NHJPq8MQYkJW3zS0N66TmWBRVytRQ_3XYM9LW5s0-rW5QwYbmVZ1Qp58047h6W8gNMdw8v8cjNW6C7L4G6Q-ZncW4nDTgt8l8ddxN5-DBYwxpLKGW6p3Z511fH7vGW3yV_BQ6-nMSdW88lsqx73gtXQN5s5SnCHYlzJN4QknP9nFp87W1D8c8Y8R67x_W1PQ9Wx18FqD5N3Sc2flPz8jNW1SZ0Xl2GBXMmW6MVYKS945k42f6Rn4d804 ) users received several firewall rules to protect against any exploits targeting these vulnerabilities on May 19, 2023. Sites still using the free version of Wordfence received the same protection on June 18, 2023. Please note that there was a delay in the release of a firewall rule while we underwent drastic changes to improve the QA of all firewall rules we release. We have no evidence to suggest that these vulnerabilities were known or targeted during this period, nor have we seen any evidence that they are currently being targeted.

We made an initial attempt to contact Kirotech, the vendor of UserPro, on May 1, 2023, but we did not receive a response until May 10, 2023, after many additional attempts. After providing full disclosure details, the developer released the first patch on July 27, 2023, and the final patch on October 31, 2023.

We urge users to update their sites to the latest patched version of UserPro, which is version 5.1.5 at the time of this writing, as soon as possible.

CONTINUE READING ON THE BLOG
(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq5m_5PW7lCGcx6lZ3pKW3BG0bc7zvg-2W5dc8pP8tDnr4W4bx72J3YvvCwW5nZ7YH1sfP6MW6qTZX95dN4Q3W8xbHrm35XqRNW3yyz4x2MLWLkW8wcch62gzW1TW3lV7KS7YD8MTW5LNXSW8hgwxlW4NrYyQ570m2VW7mmKmp118CytN6FGVfBR-CySN6W7VmvtRsTSW1-CVCk6y2gTCW7w8dDK4YWtvkVRl-yT8cDTTYW1RnHR24P-z8XW5wQYwx6c3dLSW2ssQCF51FBkgW4t8w678tMHhQW1bQr563hcNMzW61Pspn7Y10MhW4930gJ3YGbJFW4QwfpF6jhMKGN8n-Mbj6rb9KW9gN0ss71jtqCW2SXQyT85M0cgW1WGHPc793N8FW4dkYks4DtQ6kW1_L03s2zx7F_N7fCDQ09n2cjW68Bjpf7HB5ztW2B5T_y833frnW2pfmrn6lBH2jW6-3D0t5-pDypVdmKk13Ts5SdW5C3mYj4f_Zt1VRm6V06-VqcFVPM9wL5NGgJpf1txY9204 )

Please note that this is a longer post with a lot of technical details so it may be better to read it directly on the blog. (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq5m_5PW7lCGcx6lZ3pKW3BG0bc7zvg-2W5dc8pP8tDnr4W4bx72J3YvvCwW5nZ7YH1sfP6MW6qTZX95dN4Q3W8xbHrm35XqRNW3yyz4x2MLWLkW8wcch62gzW1TW3lV7KS7YD8MTW5LNXSW8hgwxlW4NrYyQ570m2VW7mmKmp118CytN6FGVfBR-CySN6W7VmvtRsTSW1-CVCk6y2gTCW7w8dDK4YWtvkVRl-yT8cDTTYW1RnHR24P-z8XW5wQYwx6c3dLSW2ssQCF51FBkgW4t8w678tMHhQW1bQr563hcNMzW61Pspn7Y10MhW4930gJ3YGbJFW4QwfpF6jhMKGN8n-Mbj6rb9KW9gN0ss71jtqCW2SXQyT85M0cgW1WGHPc793N8FW4dkYks4DtQ6kW1_L03s2zx7F_N7fCDQ09n2cjW68Bjpf7HB5ztW2B5T_y833frnW2pfmrn6lBH2jW6-3D0t5-pDypVdmKk13Ts5SdW5C3mYj4f_Zt1VRm6V06-VqcFVPM9wL5NGgJpf1txY9204 )

Vulnerability Details & Technical Analysis

Password Reset to Privilege Escalation using the Sensitive Information Disclosure via Shortcode

Description: UserPro <= 5.1.1 – Insecure Password Reset Mechanism

Affected Plugin: UserPro

Plugin Slug: userpro

Affected Versions: <= 5.1.1

CVE ID: CVE-2023-2449

CVSS Score: 9.8 (Critical)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Researcher/s: István Márton (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dc03prCCW8wLKSR6lZ3mvW1lScQH21rgNxW2jfyVW5vfDmhW86rdGx1Gg5RQW1X7NTD62plBQF13BkypQ_3XW3FjdhT11r7H1N1PSjbt3K3rkW4g22mY2jLxFjW8dg2Vp8QZyx_W8GXwT273rvzgW2xL8883vDQKWMf-Ng2R1WrHW5WrW1t8P3qFDW5VWx7T1HlfVbW49MDmd5Bt650W3TLCdw2d75DLW4_6jt999tc-SW2z3cQj7N09twVCf9pJ1HNdmtN38G3TyR2z2-W66MJpb57QdK-W5P5Mfw77Tmb6W6MHMXc1Ls7_WW3DQG7c2pF028W6q_qQq5fdMHxW84TZr884JTB9W50-G4-7PT-pdW6Jwx6L9jtgMZf4ts-tv04 )

Fully Patched Version: 5.1.2

The UserPro plugin for WordPress is vulnerable to unauthorized password resets in versions up to, and including 5.1.1. This is due to the plugin using the native WordPress password reset functionality combined with insufficient validation on the password reset function (userpro_process_form). The function uses the plaintext value of the password reset key instead of a hashed value, which means it can easily be retrieved and subsequently used. An attacker can leverage CVE-2023-2448 and CVE-2023-2446, or another vulnerability such as SQL Injection in another plugin or theme installed on the site to successfully exploit this vulnerability.

Description: UserPro <= 5.1.1 – Sensitive Information Disclosure via Shortcode

Affected Plugin: UserPro

Plugin Slug: userpro

Affected Versions: <= 5.1.1

CVE ID: CVE-2023-2446

CVSS Score: 6.5 (Medium)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Researcher/s: István Márton (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dc03prCCW8wLKSR6lZ3mvW1lScQH21rgNxW2jfyVW5vfDmhW86rdGx1Gg5RQW1X7NTD62plBQF13BkypQ_3XW3FjdhT11r7H1N1PSjbt3K3rkW4g22mY2jLxFjW8dg2Vp8QZyx_W8GXwT273rvzgW2xL8883vDQKWMf-Ng2R1WrHW5WrW1t8P3qFDW5VWx7T1HlfVbW49MDmd5Bt650W3TLCdw2d75DLW4_6jt999tc-SW2z3cQj7N09twVCf9pJ1HNdmtN38G3TyR2z2-W66MJpb57QdK-W5P5Mfw77Tmb6W6MHMXc1Ls7_WW3DQG7c2pF028W6q_qQq5fdMHxW84TZr884JTB9W50-G4-7PT-pdW6Jwx6L9jtgMZf4ts-tv04 )

Fully Patched Version: 5.1.2

The UserPro plugin for WordPress is vulnerable to sensitive information disclosure via the ‘userpro’ shortcode in versions up to, and including 5.1.1. This is due to insufficient restriction on sensitive user meta values that can be retrieved via that shortcode. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to retrieve sensitive user metadata that can be used to gain access to high privileged user accounts.

The UserPro plugin provides the shortcode ‘[userpro template="reset"]‘ to embed a password reset form into a page on a WordPress site. The form allows users to submit their username or email address to receive an email with a password reset link containing a user secret key.

Examining the code reveals that the plugin sends the user secret key with the 'reset' template in the userpro_process_form() function:

[View the code snippet on the blog.] (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq5m_5PW7lCGcx6lZ3pKW3BG0bc7zvg-2W5dc8pP8tDnr4W4bx72J3YvvCwW5nZ7YH1sfP6MW6qTZX95dN4Q3W8xbHrm35XqRNW3yyz4x2MLWLkW8wcch62gzW1TW3lV7KS7YD8MTW5LNXSW8hgwxlW4NrYyQ570m2VW7mmKmp118CytN6FGVfBR-CySN6W7VmvtRsTSW1-CVCk6y2gTCW7w8dDK4YWtvkVRl-yT8cDTTYW1RnHR24P-z8XW5wQYwx6c3dLSW2ssQCF51FBkgW4t8w678tMHhQW1bQr563hcNMzW61Pspn7Y10MhW4930gJ3YGbJFW4QwfpF6jhMKGN8n-Mbj6rb9KW9gN0ss71jtqCW2SXQyT85M0cgW1WGHPc793N8FW4dkYks4DtQ6kW1_L03s2zx7F_N7fCDQ09n2cjW68Bjpf7HB5ztW2B5T_y833frnW2pfmrn6lBH2jW6-3D0t5-pDypVdmKk13Ts5SdW5C3mYj4f_Zt1VRm6V06-VqcFVPM9wL5NGgJpf1txY9204 )

After the ‘uniquekey’ is generated, it is saved in the database with the update_user_meta() function in plain text format, and then the same code is sent to the user by email with the userpro_mail() function.

The plugin checks that the user secret key belongs to the given user with the 'change' template in the userpro_process_form() function:

[View the code snippet on the blog.] (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq5m_5PW7lCGcx6lZ3pKW3BG0bc7zvg-2W5dc8pP8tDnr4W4bx72J3YvvCwW5nZ7YH1sfP6MW6qTZX95dN4Q3W8xbHrm35XqRNW3yyz4x2MLWLkW8wcch62gzW1TW3lV7KS7YD8MTW5LNXSW8hgwxlW4NrYyQ570m2VW7mmKmp118CytN6FGVfBR-CySN6W7VmvtRsTSW1-CVCk6y2gTCW7w8dDK4YWtvkVRl-yT8cDTTYW1RnHR24P-z8XW5wQYwx6c3dLSW2ssQCF51FBkgW4t8w678tMHhQW1bQr563hcNMzW61Pspn7Y10MhW4930gJ3YGbJFW4QwfpF6jhMKGN8n-Mbj6rb9KW9gN0ss71jtqCW2SXQyT85M0cgW1WGHPc793N8FW4dkYks4DtQ6kW1_L03s2zx7F_N7fCDQ09n2cjW68Bjpf7HB5ztW2B5T_y833frnW2pfmrn6lBH2jW6-3D0t5-pDypVdmKk13Ts5SdW5C3mYj4f_Zt1VRm6V06-VqcFVPM9wL5NGgJpf1txY9204 )

Since the secret key is stored in plain text format, this means that an attacker that has access to user metadata can change the password of any user. This is an Insecure Password Reset Mechanism vulnerability (CVE-2023-2449). Unlike WordPress core, which saves the ‘user_activation_key’ used for password reset in the ‘users’ table, the plugin stores the key in the ‘usermeta’ table.

Using the Sensitive Information Disclosure via Shortcode (CVE-2023-2446) vulnerability, this key can be retrieved for any user, and combined with the Missing Authorization to Arbitrary Shortcode Execution via ‘userpro_shortcode_template’ function vulnerability (CVE-2023-2448), it is also possible to query it unauthenticated.

The reset password process looks like this:

userpro-password-reset-howto-wordfence (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq5m_5PW7lCGcx6lZ3mQW6dQNKT1dSntDW8pDtN540B7gHW11tS_J3MJR9hN6ScGXmSgFNmW5QFF9543dTnSV4-n114WT92ZW8gs98l6HYJp3Vk1-pq395B07VkNdgK6kFd97W8fz7lc2df5VRW84s-kD78pcHlN1nZB61x0ShrW94GWqp4SBM6VW4z2sH96M7jWFW2pGhWd4dP3gcW8D_z702SSSDFW5_43VT4S2GZkW8RPtZR1dcvKgW2KkMxL7ktngqW4f1hTV60ZZCwW2Xmjxn2HXZ_LW4j_xmM4B1HzWW22xNsZ4xZ7tfW9gH9rM1SJ9_SN47Ct7LBLnrJV3877B1k7VNSW50XzJ83shGBZW3nTjj66bmB4_W3x1Kty9jxSMmW5cQ8Hd22-dSBW7P3kSh9bXwHpN53gkzlhdwfxVTbw0B3NVGqQN4X0rLntBkhxV3Khlf2T_mdzW27CHlF5W6jKjW7y_MLw5k6KphW8szGC782kDLsW2FTQZG7jhWyMW32RwSh6PHlmff1s3Rkl04 )

The complete exploit process looks like this:

userpro-password-reset-attack-howto-wordfence (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq5m_5PW7lCGcx6lZ3mQW6dQNKT1dSntDW8pDtN540B7gHW11tS_J3MJR9hN6ScGXmSgFNmW5QFF9543dTnSV4-n114WT92ZW8gs98l6HYJp3Vk1-pq395B07VkNdgK6kFd97W8fz7lc2df5VRW84s-kD78pcHlN1nZB61x0ShrW94GWqp4SBM6VW4z2sH96M7jWFW2pGhWd4dP3gcW8D_z702SSSDFW5_43VT4S2GZkW8RPtZR1dcvKgW2KkMxL7ktngqW4f1hTV60ZZCwW2Xmjxn2HXZ_LW4j_xmM4B1HzWW22xNsZ4xZ7tfW9gH9rM1SJ9_SN47Ct7LBLnrJV3877B1k7VNSW50XzJ83shGBZW3nTjj66bmB4_W3x1Kty9jxSMmW5cQ8Hd22-dSBW7P3kSh9bXwHpN53gkzlhdwfxVTbw0B3NVGqQN4X0rLntBkhxV3Khlf2T_mdzW27CHlF5W6jKjW7y_MLw5k6KphW8szGC782kDLsW2FTQZG7jhWyMW32RwSh6PHlmff1s3Rkl04 )

A safe reset password process would look like this:

wp-core-password-reset-howto-wordfence (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq5m_5PW7lCGcx6lZ3mQW6dQNKT1dSntDW8pDtN540B7gHW11tS_J3MJR9hN6ScGXmSgFNmW5QFF9543dTnSV4-n114WT92ZW8gs98l6HYJp3Vk1-pq395B07VkNdgK6kFd97W8fz7lc2df5VRW84s-kD78pcHlN1nZB61x0ShrW94GWqp4SBM6VW4z2sH96M7jWFW2pGhWd4dP3gcW8D_z702SSSDFW5_43VT4S2GZkW8RPtZR1dcvKgW2KkMxL7ktngqW4f1hTV60ZZCwW2Xmjxn2HXZ_LW4j_xmM4B1HzWW22xNsZ4xZ7tfW9gH9rM1SJ9_SN47Ct7LBLnrJV3877B1k7VNSW50XzJ83shGBZW3nTjj66bmB4_W3x1Kty9jxSMmW5cQ8Hd22-dSBW7P3kSh9bXwHpN53gkzlhdwfxVTbw0B3NVGqQN4X0rLntBkhxV3Khlf2T_mdzW27CHlF5W6jKjW7y_MLw5k6KphW8szGC782kDLsW2FTQZG7jhWyMW32RwSh6PHlmff1s3Rkl04 )

In this case, the key required for the password reset will be hashed using the HashPassword() function and stored in hashed form in the database. The original key will only be sent to the user via email.

When the user clicks on the password reset link in the email, which contains the original key, the original key will be hashed with the HashPassword() function during the password reset process, and then compared with the hashed key in the database.

Since the original key would be hashed and would only be compared afterwards, it would not be possible to reset the password by knowing the hashed key in the database, because there is no process in WordPress core that allows you to enter a hashed key and compare it with the hashed key stored in the database.

As with any Arbitrary User Password Change that leads to a Privilege Escalation vulnerability, this can be used for complete site compromise. Once an attacker has gained administrative user access to a WordPress site they can then manipulate anything on the targeted site as a normal administrator would. This includes the ability to upload plugin and theme files, which can be malicious zip files containing backdoors, as well as modifying posts and pages which can be leveraged to redirect site users to malicious sites.

Missing Authorization to Arbitrary Shortcode Execution

Description: UserPro <= 5.1.4 – Missing Authorization to Arbitrary Shortcode Execution via userpro_shortcode_template

Affected Plugin: UserPro

Plugin Slug: userpro

Affected Versions: <= 5.1.4

CVE ID: CVE-2023-2448

CVSS Score: 6.5 (Medium)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

Researcher/s: István Márton (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dc03prCCW8wLKSR6lZ3mvW1lScQH21rgNxW2jfyVW5vfDmhW86rdGx1Gg5RQW1X7NTD62plBQF13BkypQ_3XW3FjdhT11r7H1N1PSjbt3K3rkW4g22mY2jLxFjW8dg2Vp8QZyx_W8GXwT273rvzgW2xL8883vDQKWMf-Ng2R1WrHW5WrW1t8P3qFDW5VWx7T1HlfVbW49MDmd5Bt650W3TLCdw2d75DLW4_6jt999tc-SW2z3cQj7N09twVCf9pJ1HNdmtN38G3TyR2z2-W66MJpb57QdK-W5P5Mfw77Tmb6W6MHMXc1Ls7_WW3DQG7c2pF028W6q_qQq5fdMHxW84TZr884JTB9W50-G4-7PT-pdW6Jwx6L9jtgMZf4ts-tv04 )

Fully Patched Version: 5.1.5

The UserPro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ‘userpro_shortcode_template’ function in versions up to, and including, 5.1.4. This makes it possible for unauthenticated attackers to perform arbitrary shortcode execution. An attacker can leverage CVE-2023-2446 to get sensitive information via shortcode.

The UserPro plugin has a ‘userpro_shortcode_template’ function that can be used to execute arbitrary shortcodes specified in the request parameter.

[View the code snippet on the blog.] (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq5m_5PW7lCGcx6lZ3pKW3BG0bc7zvg-2W5dc8pP8tDnr4W4bx72J3YvvCwW5nZ7YH1sfP6MW6qTZX95dN4Q3W8xbHrm35XqRNW3yyz4x2MLWLkW8wcch62gzW1TW3lV7KS7YD8MTW5LNXSW8hgwxlW4NrYyQ570m2VW7mmKmp118CytN6FGVfBR-CySN6W7VmvtRsTSW1-CVCk6y2gTCW7w8dDK4YWtvkVRl-yT8cDTTYW1RnHR24P-z8XW5wQYwx6c3dLSW2ssQCF51FBkgW4t8w678tMHhQW1bQr563hcNMzW61Pspn7Y10MhW4930gJ3YGbJFW4QwfpF6jhMKGN8n-Mbj6rb9KW9gN0ss71jtqCW2SXQyT85M0cgW1WGHPc793N8FW4dkYks4DtQ6kW1_L03s2zx7F_N7fCDQ09n2cjW68Bjpf7HB5ztW2B5T_y833frnW2pfmrn6lBH2jW6-3D0t5-pDypVdmKk13Ts5SdW5C3mYj4f_Zt1VRm6V06-VqcFVPM9wL5NGgJpf1txY9204 )

The ‘wp_ajax_nopriv_userpro_shortcode_template’ AJAX action also can be used by users who are not authenticated to WordPress due to the hook utilizing ‘nopriv’.

This vulnerability, on its own, wouldn’t be severe, but it makes it possible to exploit other vulnerabilities even without authentication.

Since WordPress 6.3.2, contributor-level permissions and above are required to execute shortcodes, which means this vulnerability is more impactful on updated WordPress installations.

Authentication Bypass to Administrator

Description: UserPro <= 5.1.1 – Authentication Bypass to Administrator

Affected Plugin: UserPro

Plugin Slug: userpro

Affected Versions: <= 5.1.1

CVE ID: CVE-2023-2437

CVSS Score: 9.8 (Critical)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Researcher/s: István Márton (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dc03prCCW8wLKSR6lZ3mvW1lScQH21rgNxW2jfyVW5vfDmhW86rdGx1Gg5RQW1X7NTD62plBQF13BkypQ_3XW3FjdhT11r7H1N1PSjbt3K3rkW4g22mY2jLxFjW8dg2Vp8QZyx_W8GXwT273rvzgW2xL8883vDQKWMf-Ng2R1WrHW5WrW1t8P3qFDW5VWx7T1HlfVbW49MDmd5Bt650W3TLCdw2d75DLW4_6jt999tc-SW2z3cQj7N09twVCf9pJ1HNdmtN38G3TyR2z2-W66MJpb57QdK-W5P5Mfw77Tmb6W6MHMXc1Ls7_WW3DQG7c2pF028W6q_qQq5fdMHxW84TZr884JTB9W50-G4-7PT-pdW6Jwx6L9jtgMZf4ts-tv04 )

Fully Patched Version: 5.1.2

The UserPro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.1.1. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they know the user’s email address. An attacker can leverage CVE-2023-2448 and CVE-2023-2446 to get the user’s email address to successfully exploit this vulnerability.

The UserPro plugin provides a Facebook social media login. Examining the code reveals that this works completely differently than the usual OAuth authentication.

The login method is available via AJAX request, via the following hook:

[View the code snippet on the blog.] (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq5m_5PW7lCGcx6lZ3pKW3BG0bc7zvg-2W5dc8pP8tDnr4W4bx72J3YvvCwW5nZ7YH1sfP6MW6qTZX95dN4Q3W8xbHrm35XqRNW3yyz4x2MLWLkW8wcch62gzW1TW3lV7KS7YD8MTW5LNXSW8hgwxlW4NrYyQ570m2VW7mmKmp118CytN6FGVfBR-CySN6W7VmvtRsTSW1-CVCk6y2gTCW7w8dDK4YWtvkVRl-yT8cDTTYW1RnHR24P-z8XW5wQYwx6c3dLSW2ssQCF51FBkgW4t8w678tMHhQW1bQr563hcNMzW61Pspn7Y10MhW4930gJ3YGbJFW4QwfpF6jhMKGN8n-Mbj6rb9KW9gN0ss71jtqCW2SXQyT85M0cgW1WGHPc793N8FW4dkYks4DtQ6kW1_L03s2zx7F_N7fCDQ09n2cjW68Bjpf7HB5ztW2B5T_y833frnW2pfmrn6lBH2jW6-3D0t5-pDypVdmKk13Ts5SdW5C3mYj4f_Zt1VRm6V06-VqcFVPM9wL5NGgJpf1txY9204 )

The plugin uses the Facebook app ID to store the user ID in the usermeta table with AES encryption.

During the login process, it queries the user based on the provided ID, and if it finds the connected user, it logs them in.

However, if it does not find a user based on ID, the plugin tries to find the user based on the email specified in the request:

[View the code snippet on the blog.] (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq5m_5PW7lCGcx6lZ3pKW3BG0bc7zvg-2W5dc8pP8tDnr4W4bx72J3YvvCwW5nZ7YH1sfP6MW6qTZX95dN4Q3W8xbHrm35XqRNW3yyz4x2MLWLkW8wcch62gzW1TW3lV7KS7YD8MTW5LNXSW8hgwxlW4NrYyQ570m2VW7mmKmp118CytN6FGVfBR-CySN6W7VmvtRsTSW1-CVCk6y2gTCW7w8dDK4YWtvkVRl-yT8cDTTYW1RnHR24P-z8XW5wQYwx6c3dLSW2ssQCF51FBkgW4t8w678tMHhQW1bQr563hcNMzW61Pspn7Y10MhW4930gJ3YGbJFW4QwfpF6jhMKGN8n-Mbj6rb9KW9gN0ss71jtqCW2SXQyT85M0cgW1WGHPc793N8FW4dkYks4DtQ6kW1_L03s2zx7F_N7fCDQ09n2cjW68Bjpf7HB5ztW2B5T_y833frnW2pfmrn6lBH2jW6-3D0t5-pDypVdmKk13Ts5SdW5C3mYj4f_Zt1VRm6V06-VqcFVPM9wL5NGgJpf1txY9204 )

The most significant problem and vulnerability is caused by the fact that there is no connection with Facebook, and the email is not verified as coming from Facebook’s system – instead the attacker can provide the email in the request.

This makes it possible for threat actors to bypass authentication entirely and gain access to arbitrary accounts on sites running a vulnerable version of the plugin. As always, authentication bypass vulnerabilities resulting in access to high privileged user accounts make it easy for threat actors to completely compromise a vulnerable WordPress site and further infect the victim.

Since there are several different vulnerabilities in the plugin, which can be used to query users’ email, this vulnerability is critical and can be easily exploited.

Wordfence Firewall

The following graphic demonstrates the steps to exploitation an attacker might take and at which point the Wordfence firewall would block an attacker from successfully exploiting the vulnerability.

userpro-facebook-auth-bypass-howto-wordfence-firewall (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq5m_5PW7lCGcx6lZ3mQW6dQNKT1dSntDW8pDtN540B7gHW11tS_J3MJR9hN6ScGXmSgFNmW5QFF9543dTnSV4-n114WT92ZW8gs98l6HYJp3Vk1-pq395B07VkNdgK6kFd97W8fz7lc2df5VRW84s-kD78pcHlN1nZB61x0ShrW94GWqp4SBM6VW4z2sH96M7jWFW2pGhWd4dP3gcW8D_z702SSSDFW5_43VT4S2GZkW8RPtZR1dcvKgW2KkMxL7ktngqW4f1hTV60ZZCwW2Xmjxn2HXZ_LW4j_xmM4B1HzWW22xNsZ4xZ7tfW9gH9rM1SJ9_SN47Ct7LBLnrJV3877B1k7VNSW50XzJ83shGBZW3nTjj66bmB4_W3x1Kty9jxSMmW5cQ8Hd22-dSBW7P3kSh9bXwHpN53gkzlhdwfxVTbw0B3NVGqQN4X0rLntBkhxV3Khlf2T_mdzW27CHlF5W6jKjW7y_MLw5k6KphW8szGC782kDLsW2FTQZG7jhWyMW32RwSh6PHlmff1s3Rkl04 )

Authenticated (Subscriber+) Privilege Escalation

Description: UserPro <= 5.1.4 – Authenticated (Subscriber+) Privilege Escalation

Affected Plugin: UserPro

Plugin Slug: userpro

Affected Versions: <= 5.1.4

CVE ID: CVE-2023-6009

CVSS Score: 8.8 (High)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Researcher/s: István Márton (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dc03prCCW8wLKSR6lZ3mvW1lScQH21rgNxW2jfyVW5vfDmhW86rdGx1Gg5RQW1X7NTD62plBQF13BkypQ_3XW3FjdhT11r7H1N1PSjbt3K3rkW4g22mY2jLxFjW8dg2Vp8QZyx_W8GXwT273rvzgW2xL8883vDQKWMf-Ng2R1WrHW5WrW1t8P3qFDW5VWx7T1HlfVbW49MDmd5Bt650W3TLCdw2d75DLW4_6jt999tc-SW2z3cQj7N09twVCf9pJ1HNdmtN38G3TyR2z2-W66MJpb57QdK-W5P5Mfw77Tmb6W6MHMXc1Ls7_WW3DQG7c2pF028W6q_qQq5fdMHxW84TZr884JTB9W50-G4-7PT-pdW6Jwx6L9jtgMZf4ts-tv04 )

Fully Patched Version: 5.1.5

The UserPro plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1.4 due to insufficient restriction on the ‘userpro_update_user_profile’ function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the ‘wp_capabilities’ parameter during a profile update.

The UserPro plugin provides the shortcode ‘[userpro template="edit"]‘ to edit a user profile. This provides the usual profile fields, such as first name, last name, biography, or social profile urls.

The form is processed via AJAX when submitted, using the userpro_process_form function. The function processes the values provided by the user in the request as follows:

[View the code snippet on the blog.] (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq5m_5PW7lCGcx6lZ3pKW3BG0bc7zvg-2W5dc8pP8tDnr4W4bx72J3YvvCwW5nZ7YH1sfP6MW6qTZX95dN4Q3W8xbHrm35XqRNW3yyz4x2MLWLkW8wcch62gzW1TW3lV7KS7YD8MTW5LNXSW8hgwxlW4NrYyQ570m2VW7mmKmp118CytN6FGVfBR-CySN6W7VmvtRsTSW1-CVCk6y2gTCW7w8dDK4YWtvkVRl-yT8cDTTYW1RnHR24P-z8XW5wQYwx6c3dLSW2ssQCF51FBkgW4t8w678tMHhQW1bQr563hcNMzW61Pspn7Y10MhW4930gJ3YGbJFW4QwfpF6jhMKGN8n-Mbj6rb9KW9gN0ss71jtqCW2SXQyT85M0cgW1WGHPc793N8FW4dkYks4DtQ6kW1_L03s2zx7F_N7fCDQ09n2cjW68Bjpf7HB5ztW2B5T_y833frnW2pfmrn6lBH2jW6-3D0t5-pDypVdmKk13Ts5SdW5C3mYj4f_Zt1VRm6V06-VqcFVPM9wL5NGgJpf1txY9204 )

It updates the user meta with the following function:

[View the code snippet on the blog.] (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq5m_5PW7lCGcx6lZ3pKW3BG0bc7zvg-2W5dc8pP8tDnr4W4bx72J3YvvCwW5nZ7YH1sfP6MW6qTZX95dN4Q3W8xbHrm35XqRNW3yyz4x2MLWLkW8wcch62gzW1TW3lV7KS7YD8MTW5LNXSW8hgwxlW4NrYyQ570m2VW7mmKmp118CytN6FGVfBR-CySN6W7VmvtRsTSW1-CVCk6y2gTCW7w8dDK4YWtvkVRl-yT8cDTTYW1RnHR24P-z8XW5wQYwx6c3dLSW2ssQCF51FBkgW4t8w678tMHhQW1bQr563hcNMzW61Pspn7Y10MhW4930gJ3YGbJFW4QwfpF6jhMKGN8n-Mbj6rb9KW9gN0ss71jtqCW2SXQyT85M0cgW1WGHPc793N8FW4dkYks4DtQ6kW1_L03s2zx7F_N7fCDQ09n2cjW68Bjpf7HB5ztW2B5T_y833frnW2pfmrn6lBH2jW6-3D0t5-pDypVdmKk13Ts5SdW5C3mYj4f_Zt1VRm6V06-VqcFVPM9wL5NGgJpf1txY9204 )

The most significant problem and vulnerability is caused by the fact that there are no restrictions on the profile options, so the user’s metadata can be updated arbitrarily, and there is no sanitization on the field value, so any value can be set, including an array value, which is necessary for the capability meta option.

This makes it possible for authenticated users, such as subscribers, to supply the ‘wp_capabilities’ array parameter with any desired capabilities, such as administrator, during the profile update.

As with any Privilege Escalation vulnerability, this can be used for complete site compromise. Once an attacker has gained administrative user access to a WordPress site they can then manipulate anything on the targeted site as a normal administrator would. This includes the ability to upload plugin and theme files, which can be malicious zip files containing backdoors, and modifying posts and pages which can be leveraged to redirect site users to other malicious sites.

Numerous Other Missing Authorization and Cross-Site Request Forgery Vulnerabilities

In addition to the vulnerabilities outlined above, we discovered several AJAX and POST actions without proper capability checks, which made it possible for authenticated attackers with minimal access, such as subscribers, to invoke those actions. Several of the functions were also missing nonce verification, which would make it possible for attackers to forge requests on behalf of a site administrator, or any other authenticated user considering capability checks were also missing.

Disclosure Timeline

April 26, 2023 – Initial discovery of multiple vulnerabilities in UserPro.

May 1, 2023 – We initiate contact with the plugin vendor asking that they confirm the inbox for handling the discussion.

May 10, 2023 – The vendor confirms the inbox for handling the discussion.

May 10, 2023 – We send over the full disclosure details. The vendor acknowledges the report and begins working on a fix.

May 19, 2023 – Wordfence Premium, Care, and Response users receive a firewall rule to provide protection against any exploits that may target this vulnerability.

June 18, 2023 – Wordfence Free users receive the same protection.

July 27, 2023 – A partially patched version of the plugin, 5.1.1, is released.

September 28, 2023 – A partially patched version of the plugin, 5.1.2, is released.

October 31, 2023 – A fully patched version of the plugin, 5.1.5, is released.

Please note we omitted several dates from this timeline as there were extensive back and forth communications with the developer to ensure everything got adequately patched.

Conclusion

In this blog post, we detailed multiple vulnerabilities in the UserPro plugin affecting versions 5.1.4 and earlier. The vulnerabilities have been fully addressed in version 5.1.5 of the plugin. We encourage WordPress users to verify that their sites are updated to the latest patched version of UserPro as soon as possible.

Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_DbK3prCCW7Y8-PT6lZ3pxW5tD6D51gwZ2tN4gfk0hcwl35W7p2RnY818j2tW2dlTYS8ffR2sW4pfTYJ4h3_XTW764Psj3V0YWpW1DPCW687By_vW2CrYt-80Tf2FW6bQkgQ8tSrsFW5Csj182hkGNjV5ZqJV2lFV-xN1TwY-jyLD1YN7x8JdqFyMmPN5-bP8R7jRTmVr4VYF7sm7nMMbjv4dDxH1rW7Xyc_R6fs5H6W47l7FB7_mhhkW8DbmCq8bSPcsW1rzMYs6-r56VW8dss985M5kvBW3SWpW73_yY_VW4fKRCd5fg8QHW8S6gqH4RmZ6SW5c1W5794yrSHW17bd0W93BcHPf8b_5tT04 ) , Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_DbK3prCCW7Y8-PT6lZ3p5W643B_b8js-7dW833m4J6F2m5PVSP-WD5m2DVSW2139mz3xjlPhV5F_s55jbCxgW3jLJcp3Y21Z2W94_1yQ2WYljbW11-vX463rwnhW44DFRL7bbq1SVJQrNJ7FSzXsVj-wDR8FL83QW2K0zqb83xmWKW7xZC-z3hM007W1Nmn0_6yJrNjW8nz--42S7sNGW1y_s5d227Hs1W2GjZZx1lRK8BW4N5Y0k7pPP16W9cmFQ520gGrYW5PDXbH6Z62hrW52bXrt7FJtDGW3NfrpV1lf-n8N3H0GWNpn67pN3PppZbPqlg6W89tYgp1qJWzvW15bHQ86CKdbnf1pxTBT04 ) , and Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_DbK3prCCW7Y8-PT6lZ3ptW8bGngP4Y9rj9W4g_9_b7wWkGsW5Y7lw47Lzb52W1vvZ3x6JvvllW5s0ytr7nLMgRW7CDJwF6hG7MWW3CJ4qT9hdrDZW3NHJPq8MQYkJW3zS0N66TmWBRVytRQ_3XYM9LW5s0-rW5QwYbmVZ1Qp58047h6W8gNMdw8v8cjNW6C7L4G6Q-ZncW4nDTgt8l8ddxN5-DBYwxpLKGW6p3Z511fH7vGW3yV_BQ6-nMSdW88lsqx73gtXQN5s5SnCHYlzJN4QknP9nFp87W1D8c8Y8R67x_W1PQ9Wx18FqD5N3Sc2flPz8jNW1SZ0Xl2GBXMmW6MVYKS945k42f6Rn4d804 ) users received a firewall rule to protect against any exploits targeting this vulnerability on May 19, 2023. Sites still using the free version of Wordfence received the same protection on June 18, 2023.

If you know someone who uses this plugin on their site, we recommend sharing this advisory with them to ensure their site remains secure, as this vulnerability poses a significant risk.

For security researchers looking to disclose vulnerabilities responsibly, obtain a CVE ID and earn bounty rewards, you can submit your findings to Wordfence Intelligence (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_DbK3prCCW7Y8-PT6lZ3n1W3V990d6Ttw9qW6rYgFH4MLc2bN4X34FBmN5-BW5599Kd90VHN5N3gfFWZhl_Y6N4VvHVVypXcYW859Tzg62LKtKVqxXfB819FTQW7X0ws_3qcT-0W6m09Pw8pTCwyW31dYGk3yHKptN5hQKjhWxYrvW1YLg0s81yrVkW2ytqF231F2PfW7rPKSr7RlM9NW2PNYY21wlZywW8gxyTZ1DqqGmW1jlxzJ4BV2kKW5Z1w_98-MWYjW78gBGf7kj0DCW4sLC8t7l5VtpW35z8X851tg9CN7rvK6xSMhhsN2mYMRJ1T7SjV8lxhY9gbnZlW2_xNj95VkMpgf7pp_Xg04 ) and potentially earn a bounty! (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_DbK3prCCW7Y8-PT6lZ3k-W1-QH8k4Gc6rbW7b4km63VjNf0N977WvcDskHBW32zZ-f5w93NWW6Wyktp8Q6LJlW4QbJg02GSRjFW5RQzmF3KFHbLW2GVHx9921BhKW4hwwt76GC_-VW3L2VGS1-70bdW4fB9Dr3nL0N0Vy36kH8LPDfbV7HqVx5P0ylQN2RTbXZ2Wt0HW3j1jGW51vWRCW55LWvl6j4CpsW5k6Ry67sZfrgW1lSGfr3VHLCKW2g3xRD5-Pq1dW6Cs9c47dhC4wW1rzkhM8mswMrW8BmH6B4Lw59GN6kjf3rjCCwkVKDr9J7HtdVbW7kB3-24LtQ1rW6XH0cV832YQ3f3d1mMR04 )

The Full Product Lineup

wf-stacked-free-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_DbK3prCCW7Y8-PT6lZ3lDW2VrgVC7HzVf3W60s0_-1RPF7WVv9_K72b0VmCW8c79_37h9GcKW1Y2CNg5mMNTBW4dlsch1FKVhkW6PyQY66SwyZ-W3nfpLP3q4cz3W7VPt-V3sg1l7N7SJtfQXkb5hW7FDTkH1l_6r1W581rBn4vrhz1W86TC685jn2vDW6XFdqB4q8Q_bW4pCyVv65f4ThW5v_K0_7czXBxW2YL-wh138B-PW67WnpR3YGK8ZMPPPFkLRt63W2Xyxqk20nX1sW5Vysx84MLbPyW3dv7456xL2KHW7zxzZp67mx4bW4WLwJ47LZlxJW8X5WPx6v_cGNW7h6mgq1CkwJGf1k5DWn04 )

wf-stacked-premium-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_DbK3prCCW7Y8-PT6lZ3p_W5Lx31W7GN6gTW4tKM252MYWplW6f1qjm8lKdx7W8GP5nv1vpgNgW487HnF7qn8ZGW1bNtZd742JVFW8lxLFZ5Pnz7-W5BnWMH1ddGKrW697JNy2y_bhFW1JKRF62xZS2RW5_83Lx1507-cW5qH27D5R0xj4W6dQ15v3mTYG5VW18Dg5SSdd5N5dKY6Y7BVpWW6bMkYd3t-WrYW9c2Q7L8wlm_8VgMssH69-jxkVZkVzk65-8gjW2V0xZC3B0ql_W6bVH-85t9_s1W1nbZMp499CgRW4r91F463QmsRW1pNkD13l_8ZTW95CyT22VpBMRW3Gkq-L1TYlwgf3Q4l3K04 )

wf-stacked-care-3 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_DbK3prCCW7Y8-PT6lZ3lNW4x6qf28CPNfjW1mkkr14DdpG2W23tfst5Cjh4CN6Y6FJDdMGYVW658xlS5kYnyYW1--3m23WP5g6W5NX6Qt81tqXsW27cnZD3s02bGW5D_b7s4qm085VB8QQB88Tqc2W3LgsKG4Jk7b4W2XVT7n6TmGzRW2yz41s4NkQhDW5KvQ6y9kP-5mW54vT3650vQhmW9bB5Cv3bzwvhW3xZ1k95WDPVxN1gR6DprvvyJW4Yj2Gg1bsDD6W3LlkMQ6MLR-PN1FHh4kGp5R-W6yRs1x36RKr9V1hfcb1bKm_MW44tFNL6GPBZ5W1pNqMk7t-zH9W97j1PT1ZSykQf55jGM-04 )

wf-stacked-response-2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_DbK3prCCW7Y8-PT6lZ3ptW8bGngP4Y9rj9W4g_9_b7wWkGsW5Y7lw47Lzb52W1vvZ3x6JvvllW5s0ytr7nLMgRW7CDJwF6hG7MWW3CJ4qT9hdrDZW3NHJPq8MQYkJW3zS0N66TmWBRVytRQ_3XYM9LW5s0-rW5QwYbmVZ1Qp58047h6W8gNMdw8v8cjNW6C7L4G6Q-ZncW4nDTgt8l8ddxN5-DBYwxpLKGW6p3Z511fH7vGW3yV_BQ6-nMSdW88lsqx73gtXQN5s5SnCHYlzJN4QknP9nFp87W1D8c8Y8R67x_W1PQ9Wx18FqD5N3Sc2flPz8jNW1SZ0Xl2GBXMmW6MVYKS945k42f6Rn4d804 )

wf-stacked-cli (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_DbK3prCCW7Y8-PT6lZ3n_W8dWDkf7JrxCRW8NDD-W4hRQg7W2pNlmN1FJRRRW7mRzGQ6JJYMkW2fprJf3bSxnlN5hjbF3D_gkDW8X8jnQ6JDksbW8692Kr8yT2ymW9m4L2T6lhYB5W3Yjd1W4nFhwvW7pvTnl5WdDVcW6WDPsF1hdppgVmZRSN5VFSKpVy6Wd85VwXt2W2N1-w47ClBPvW499cF11HR0CTW7XWDcx4Frc1ZW473bJM3S9T_JVRdNtd5pRdbKW8DqRVM4Jq6BTW60fdk199_XG6W7NCZcv3jkQkzW6L6n2B7vzZRBW472f4W2WtBfXVQN2y12QWqZlMBwwrf3qKTBf8jzNh204 )

wf-stacked-intelligence (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Dbq3prCCW7lCdLW6lZ3kzN4rFGfzGfcW9W7F-Zj16RTDhJW5jCKtC583F4mW8ZLjkj7JYQLdW10zcNC40yPD4W7Ywr9f4Gv-B5W5j1pzl6WnLyyW5mm9Gs6-S7RZW1Wrll24rYnYnW2W2nJ_4qsfr5W3Jpqnn4Q937KW4sfR0P8vyJGsW2qXyXm4pN3dFM85LtQ_9-fNV34qSs98LhbTW5m7Wk01-NKM5W1XZ9BH3xW9rqV73rMS1w025NW278HT626-jK2W1Zp9vR8h2yfbW5yVMzY1DZmmVN363W5DMdhmpW8F1xdp3xZ9YZN3dbVCNW8c2rf1fdZf604 )

logo-defiant (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Db63prCCW6N1vHY6lZ3pbW68BpGx8cWmj-N97_fN_hTkVKVKCGv-6dBT85W5p5W397n9lRhW4_VCMB7xJp9tW2cC1-y2Nc3DBVqTRml1qn0NsN86qzHv7_dhCW88LVFf47vDQ2W1nBZKW5MlqCtW3QgQNl8f1NXrW22-Bxj8HlTy6W3N1K9m6lTlsGW5dxcKf2KPCqNV99mb94x7jkJW5tYxyF4SNt7wW32Z1bk7VLsVbW7zRfPg699NRwW5SJ36B6gjjWRW2wn4xp2QvnzkW6-c4Pm8pyVlZW3RX0Dq7hbVKLf1JhtDT04 )

Defiant, Inc., 1700 Westlake Ave N STE 200

Seattle, WA 98109 United States

Unsubscribe (https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFdjW87lrBK8YVpD0V25ySy7ZnjxkN8k8JkLXcpG2N5Jjf_CXk_7QVbwdsG6Wr1Q3W577brg1ZCnbFw4V0Dmp4L62&v=3&_hsenc=p2ANqtz-9cVE9OjkBJa3H1Zv8ERzOa7DQnIX-WveUncN_Q9AriqgpNOaP75MNCVpKY3uUI_FJUenU9zQUgUvWaB01iIl4fpEji2Q&_hsmi=283505482 ) Manage Preferences (https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFdjW87lrBK8YVpD0V25ySy7ZnjxkN8k8JkLXcpG2N5Jjf_CXk_7QVbwdsG6Wr1Q3W577brg1ZCnbFw4V0Dmp4L62&v=3&_hsenc=p2ANqtz-9cVE9OjkBJa3H1Zv8ERzOa7DQnIX-WveUncN_Q9AriqgpNOaP75MNCVpKY3uUI_FJUenU9zQUgUvWaB01iIl4fpEji2Q&_hsmi=283505482 )

ISO_27001 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VXjxDt2WNkm5W7QFzdV619mgLVBzM2_567fQSN44_Db63prCCW6N1vHY6lZ3p-W1kK1kJ87W8MNW2Y6_RK2N-5CPW3kX8W67DkR0-W3-dc0X40N8GRW2rSnzr4wTz7pW8wCFLl11jqCzW95DXqC3tZ36hW5rmZzc311fcSV3gxp268f84ZW3X8-xm48K4SbW80QfJy6HrnQvVwKg1f6crbCNW51PrHf9kVX4lW95TDsf2C2_vjW18nXgs4zqFxRW7dbxZR3mSs3vW8m_z9l78MfbQN37kXR7b2VtxW42BHgg2jJdSkW17_fbw5DLQY-W3LnH4x78PhbPW3RCg8Z7hwTYsf2RZpMn04 )

You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Tue Nov 21 2023 - 21:05:36 CET

This archive was generated by hypermail 2.3.0 : Tue Nov 21 2023 - 21:13:03 CET