[WordPress Security] Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution

From: Wordfence <list_at_wordfence.com>
Date: Mon, 4 Dec 2023 07:26:40 -0800

Arbitrary File Uploads allowed through vulnerability in MW WP Form WordPress Plugin.

Wordfence-Logo.png (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL5x3prCCW6N1vHY6lZ3nzW6Nh8VM8d07jCW8tKxL05gCY7VN762jGgG1wx0W20hmYR45_N74VDvpkH1tMyfFW6309wN7ym0jrW3Hh59M8vSlNnW3l2cS77kl1_fW21dRWJ92J3G9N73j6llCcKzvN6Fltt4Lb-PzW5Js8kx3850xhVGdXsk1tbdmhW7d_Yzv80pgSLMN9RfNpRyLSW2PNjf03VDL_DW2wfwqW64xsNYW6rzx-55gTGwtW7V4HkQ8p52DkW882Wx-3kZcTfN42PtP3CPWwKW5PmfpK76z3Y1dHqnTR04 )

FeaturedImage_Wordfence_56.03 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL5x5m_5PW6N1X8z6lZ3nLW1qcdBH5FfNsHW7jdYky6yJPTFVPgV4T2wnlRhN84tkh_SrPr6N164HtLKC7pxW9bmMMq2lWm29W1_B8cs4ZWsqxVlTnsZ1WtXfXW9cN42g3hLMc_V2Gzll7Y1Dw0W2PvbmH5_Cz8jW9jtMBx5wglR7W1BYPTT4-D_zPW6kBhVV6C408DN2PX1tJPzSR1W6TRDng6324tdVk05FM7K27DyW3qGGKm4Q2pGdN4Pw1plCknJBW6CByZF77d-44W6Vb0hw913VG5W5l3J-n6rtMCNW3D-bGL9kjJGBV_6pXs6TpDWSW5fS37n12xtSdVtgLDC5GcXWkW739nwl55LbXnW59tS9X4fRz4BW6z8t-s3RC2gLW5wt9wp6rZmgRW7rkY_R6jq4yhW3T7mZk3xRv3CN4q0dwNQZ8RvW8JtP7q2YkVQYW3GcTRD743H9JW5pswS677n6SbW1BGCLG8Fd4yqN7p5dbrbsRr7f9bYP9204 )

On November 24, 2023, the Wordfence Threat Intelligence team identified and began the responsible disclosure process for an Unauthenticated Arbitrary File Upload vulnerability in MW WP Form plugin, which is actively installed on more than 200,000 WordPress websites. This vulnerability makes it possible for an unauthenticated attacker to upload arbitrary files, including PHP files, and achieve remote code execution on a vulnerable site’s server when the “Saving inquiry data in database” option in the form settings is enabled.

All Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL663prCCW7Y8-PT6lZ3kLW4sFvyc3vVycTW798KK28LnFCXW8jkyXM4N3MHqW52Xz0852lWcSW2ZG7dd4NRGNhTLS-H1_5MmPW3_Qhxl90fmLhW2wVCx-5LBMqMW62qGKp9dJtJGW55Ty9q18qWysW8dSG0m8jjZn5W50Fbzc11d2KbW5_D63793CHZvV546DN95lt0CW8lzvSS8mNrVSW6XczT_2RpVM8W7g6ZRH5nkPQGVdDJ1Y4Sk-8xN5jX4m_chtB2W7hxDD56cpJpdW6cSnzH24d59RW8CrKCL5zsHBnW1Xff5v6Cpz20W7BgZYt2lR_8hN8QQYHq-D4FqW3Y67L03vjv6Qdf7xvx04 ) , Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL663prCCW7Y8-PT6lZ3pmW8QxjPr1w1BkhW5204n_8X3g0PW2R2tBS338W67W8Tfcw399lVD-W28p47B7PymgJW58pHzX3z0ZwTW5xHGvH5wCfL0W69yG3f4ZdQynN87C0_kpzQ1HW7Bb62C1QjNlXW8_9hTT7Ll-HSW3K-8R029Yz-5W61yF-t2DT1C_W375v5k2rsHj6N3CjRzvpVcb8W28Fywz6rMfNYW6lrszd1RvXM_W2jpy1s2H0SwLW5vwCNf9kXvyYW25W-Dv1sC7DCW9bb18G7-CcXrW7jYJcX8qdzWVW2-mQcL8Vf78dW1D7X-Q8HVbM3W1ZXQCY7L4VFMN64ZpL25Hlwdf4HP8bn04 ) , and Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL663prCCW7Y8-PT6lZ3kBW8J725G7n44zCW11bNg248pKGDW2H9q2F7kwQydW612hRf3cwDLgW6kXcFS6JH-GzW8T5rh37w3kjnW2d61VG2FRSXLW8vc9Z71qGYx2W7fpFxz7vRXTzW8KH-gh8-JdSNW6QZ2JT3FdNRRW95DS8P5zWVv-W7JFls1737MllW8LwlYZ21VJcKVsKPCl59GG32W1SSzW77b_rdmW5NM4fw498vSMW2rRq8b5XMSbKW8d1LDB1mHgx4W82-Wc7534rW0W4f2Zcl887J3nW6B692h6Fgp8qW6MGN904QHFc_W78-ldb7b4-n2W8WlC3D1c55SzN7jtmrJKs7_Qf4CK7bs04 ) customers, as well as those still using the free version of our plugin, are protected against any exploits targeting this vulnerability by the Wordfence firewall’s built-in Malicious File Upload protection.

We contacted the Web-Soudan Team on November 24, 2023, and received a response the same day. After providing full disclosure details, the developer released a patch on November 29, 2023. We would like to commend The Web-Soudan Team for their prompt response and timely patch.

We urge users to update their sites with the latest patched version of MW WP Form, which is version 5.0.2 at the time of this writing, as soon as possible.

CONTINUE READING ON THE BLOG
(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL5x5m_5PW6N1X8z6lZ3nLW1qcdBH5FfNsHW7jdYky6yJPTFVPgV4T2wnlRhN84tkh_SrPr6N164HtLKC7pxW9bmMMq2lWm29W1_B8cs4ZWsqxVlTnsZ1WtXfXW9cN42g3hLMc_V2Gzll7Y1Dw0W2PvbmH5_Cz8jW9jtMBx5wglR7W1BYPTT4-D_zPW6kBhVV6C408DN2PX1tJPzSR1W6TRDng6324tdVk05FM7K27DyW3qGGKm4Q2pGdN4Pw1plCknJBW6CByZF77d-44W6Vb0hw913VG5W5l3J-n6rtMCNW3D-bGL9kjJGBV_6pXs6TpDWSW5fS37n12xtSdVtgLDC5GcXWkW739nwl55LbXnW59tS9X4fRz4BW6z8t-s3RC2gLW5wt9wp6rZmgRW7rkY_R6jq4yhW3T7mZk3xRv3CN4q0dwNQZ8RvW8JtP7q2YkVQYW3GcTRD743H9JW5pswS677n6SbW1BGCLG8Fd4yqN7p5dbrbsRr7f9bYP9204 )

Vulnerability Summary from Wordfence Intelligence

Description: MW WP Form <= 5.0.1 – Unauthenticated Arbitrary File Upload (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL5d5m_5PW69t95C6lZ3q4W70JD2p6nN9W4W5xT9Lk2BYS2RW7mgg9k5RbKnMW7_gq3d2fVRyYW64vdJM4ncCz0W61yH4j9b-G--MLQ0hkcGFXcW3p3Tft7QBZW0N2wXpCmZ3-zvW2B-WD92nqgLxW5T7g4s1GxY95W1zL-P61VxGx3W4K_97n5m2Q4KW9bLFBr1_x8zjVQK9mm4LD3-QW4-WylS8pWKs1W24mNQz4SMWw2W5vyXtQ1hWRbvW7jttMz44Rbq7Vtb_q831G1T3W3_VHp88nF7M_W3PK4mN94j9g1W3q9sPC2CDPDFW8z2vCM24_G_YW1DBfvv8fyY8PW7PZM1T8ggK2gVb1WJs8XX4G0W3xcl5K1BjH_LW4CCYR26jwPWVW37jw0k3rtPm2W7Z19Vl1kDVLjW7YqXTH39lcr_W5CqG281vGLxfW2Xdxtg91kBMzW40wYJ81cVKPMN92J8WvGtQlmf6bjS9K04 )

Affected Plugin: MW WP Form

Plugin Slug: mw-wp-form

Affected Versions: <= 5.0.1

CVE ID: CVE-2023-6316

CVSS Score: 9.8 (Critical)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Researcher/s: István Márton (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL6q3prCCW8wLKSR6lZ3mDW426FwD95WjD5W7cWZwR73TgkyW8CWLcM13yXJ3N4tm2-PJx2SpVNj-sy8YNLwQW1B6Mt42BMz1LW4h0C6m7BSts4N2vvQkpswDmMW61RCFp1MQRBxW1CzH6n43XVdVW4mNL9070nsDXW30_MB65lyThZW8hT6yy34X9MCW5sb_zs10TTFMW2rk_mN2X_8wlW3jkd2z795npHW6Lc1s44-g-ymW5HHsz-2k01BPW1tsD-r7HYWNKV7KXPF7Pn_4BW6YRv3y7JgFrbW20MNQy3BKHKzW5Xt55c4zXvCcN4nm4dVSwswyW7nmCXF2hj1yMW1mpNt_7mJx_XW3dNzFb19W7V6VZr-8M8gR_r0f91T0Fn04 )

Fully Patched Version: 5.0.2

The MW WP Form plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the ‘_single_file_upload’ function in versions up to, and including, 5.0.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible.

Technical Analysis

The MW WP Form plugin provides a shortcode-based form builder, with many customizable fields and many useful form options. Files can also be uploaded to the form with the [mwform_file name="file"] shortcode field.

Examining the code reveals that the plugin uses the _single_file_upload() function in the MW_WP_Form_File class to file upload, and the check_file_type() function in the MWF_Functions class is used to check the file type.

[View the code snippet on the blog] (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL5x5m_5PW6N1X8z6lZ3nLW1qcdBH5FfNsHW7jdYky6yJPTFVPgV4T2wnlRhN84tkh_SrPr6N164HtLKC7pxW9bmMMq2lWm29W1_B8cs4ZWsqxVlTnsZ1WtXfXW9cN42g3hLMc_V2Gzll7Y1Dw0W2PvbmH5_Cz8jW9jtMBx5wglR7W1BYPTT4-D_zPW6kBhVV6C408DN2PX1tJPzSR1W6TRDng6324tdVk05FM7K27DyW3qGGKm4Q2pGdN4Pw1plCknJBW6CByZF77d-44W6Vb0hw913VG5W5l3J-n6rtMCNW3D-bGL9kjJGBV_6pXs6TpDWSW5fS37n12xtSdVtgLDC5GcXWkW739nwl55LbXnW59tS9X4fRz4BW6z8t-s3RC2gLW5wt9wp6rZmgRW7rkY_R6jq4yhW3T7mZk3xRv3CN4q0dwNQZ8RvW8JtP7q2YkVQYW3GcTRD743H9JW5pswS677n6SbW1BGCLG8Fd4yqN7p5dbrbsRr7f9bYP9204 )

The upload function checks the file and then copies it to the server with the move_uploaded_file() function. The file is only stored on the server if the “Saving inquiry data in database” option is selected in the form settings. Otherwise the file is immediately deleted after submitting the form.

[View the code snippet on the blog] (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL5x5m_5PW6N1X8z6lZ3nLW1qcdBH5FfNsHW7jdYky6yJPTFVPgV4T2wnlRhN84tkh_SrPr6N164HtLKC7pxW9bmMMq2lWm29W1_B8cs4ZWsqxVlTnsZ1WtXfXW9cN42g3hLMc_V2Gzll7Y1Dw0W2PvbmH5_Cz8jW9jtMBx5wglR7W1BYPTT4-D_zPW6kBhVV6C408DN2PX1tJPzSR1W6TRDng6324tdVk05FM7K27DyW3qGGKm4Q2pGdN4Pw1plCknJBW6CByZF77d-44W6Vb0hw913VG5W5l3J-n6rtMCNW3D-bGL9kjJGBV_6pXs6TpDWSW5fS37n12xtSdVtgLDC5GcXWkW739nwl55LbXnW59tS9X4fRz4BW6z8t-s3RC2gLW5wt9wp6rZmgRW7rkY_R6jq4yhW3T7mZk3xRv3CN4q0dwNQZ8RvW8JtP7q2YkVQYW3GcTRD743H9JW5pswS677n6SbW1BGCLG8Fd4yqN7p5dbrbsRr7f9bYP9204 )

Unfortunately, although the file type check function works perfectly and returns false for dangerous file types, it throws a runtime exception in the try block if a disallowed file type is uploaded, which will be caught and handled by the catch block. The catch block only uses the error_log() function to log the error without interrupting the upload. This means that even if the dangerous file type is checked and detected, it is only logged, while the function continues to run and the file is uploaded. This means that attackers could upload arbitrary PHP files and then access those files to trigger their execution on the server, achieving remote code execution.

We would like to draw attention once again to the fact that the vulnerability only critically affects users who have enabled the “Saving inquiry data in database” option in the form settings, because the plugin only saves the files in this configuration.

Disclosure Timeline

November 24, 2023 – Discovery of the Arbitrary File Upload vulnerability in MW WP Form.

November 24, 2023 – We initiate contact with the plugin vendor asking that they confirm the inbox for handling the discussion.

November 24, 2023 – The vendor confirms the inbox for handling the discussion.

November 24, 2023 – We send over the full disclosure details. The vendor acknowledges the report and begins working on a fix.

November 29, 2023 – A fully patched version of the plugin, 5.0.2, is released.

Conclusion

In this blog post, we detailed an Arbitrary File Upload vulnerability within the MW WP Form plugin affecting versions 5.0.1 and earlier. This vulnerability allows unauthenticated threat actors to upload arbitrary files, including PHP backdoors, and execute those files on the server. The vulnerability has been fully addressed in version 5.0.2 of the plugin.

We encourage WordPress users to verify that their sites are updated to the latest patched version of MW WP Form.

All Wordfence users, including those running Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL663prCCW7Y8-PT6lZ3kLW4sFvyc3vVycTW798KK28LnFCXW8jkyXM4N3MHqW52Xz0852lWcSW2ZG7dd4NRGNhTLS-H1_5MmPW3_Qhxl90fmLhW2wVCx-5LBMqMW62qGKp9dJtJGW55Ty9q18qWysW8dSG0m8jjZn5W50Fbzc11d2KbW5_D63793CHZvV546DN95lt0CW8lzvSS8mNrVSW6XczT_2RpVM8W7g6ZRH5nkPQGVdDJ1Y4Sk-8xN5jX4m_chtB2W7hxDD56cpJpdW6cSnzH24d59RW8CrKCL5zsHBnW1Xff5v6Cpz20W7BgZYt2lR_8hN8QQYHq-D4FqW3Y67L03vjv6Qdf7xvx04 ) , Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL663prCCW7Y8-PT6lZ3pmW8QxjPr1w1BkhW5204n_8X3g0PW2R2tBS338W67W8Tfcw399lVD-W28p47B7PymgJW58pHzX3z0ZwTW5xHGvH5wCfL0W69yG3f4ZdQynN87C0_kpzQ1HW7Bb62C1QjNlXW8_9hTT7Ll-HSW3K-8R029Yz-5W61yF-t2DT1C_W375v5k2rsHj6N3CjRzvpVcb8W28Fywz6rMfNYW6lrszd1RvXM_W2jpy1s2H0SwLW5vwCNf9kXvyYW25W-Dv1sC7DCW9bb18G7-CcXrW7jYJcX8qdzWVW2-mQcL8Vf78dW1D7X-Q8HVbM3W1ZXQCY7L4VFMN64ZpL25Hlwdf4HP8bn04 ) , and Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL663prCCW7Y8-PT6lZ3kBW8J725G7n44zCW11bNg248pKGDW2H9q2F7kwQydW612hRf3cwDLgW6kXcFS6JH-GzW8T5rh37w3kjnW2d61VG2FRSXLW8vc9Z71qGYx2W7fpFxz7vRXTzW8KH-gh8-JdSNW6QZ2JT3FdNRRW95DS8P5zWVv-W7JFls1737MllW8LwlYZ21VJcKVsKPCl59GG32W1SSzW77b_rdmW5NM4fw498vSMW2rRq8b5XMSbKW8d1LDB1mHgx4W82-Wc7534rW0W4f2Zcl887J3nW6B692h6Fgp8qW6MGN904QHFc_W78-ldb7b4-n2W8WlC3D1c55SzN7jtmrJKs7_Qf4CK7bs04 ) , as well as sites still running the free version of Wordfence, are fully protected against this vulnerability.

If you know someone who uses this plugin on their site, we recommend sharing this advisory with them to ensure their site remains secure, as this vulnerability poses a significant risk.

Did you know that Wordfence has a Bug Bounty Program (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL663prCCW7Y8-PT6lZ3pkW28lPyy3mQphPW6Vns7K7dgzY7W2qXbJ09cyZ_cW6zhCSn3P2Kk5W1_SqmW3G7Vt7W1hJKQ-5YrgNvW3dqsmy9fBtZvW8k0k8P3BF3RYW1vjmcw1_PbCdVm811F3y-NV8VNW1Xm5QHs6ZW7kQYS43sxfRDW1D--322ybXrHW8KJHXd1xmT5JW52DqpQ27KXDRW65Tlqb1SdT9JV9LJDx9cKlpfW8jyFnP90NTq3W3_r_LQ1sy2bYVJV4Vx76ckQkW4vdm5M3z7cbVW2NpB8-2drQjGW4GbfR256C_-7W5S_YVR4CnwCWW3vCx1p2PVxnYW7xXb805Grzy-f8qhD6j04 ) ? We’ve recently increased our bounties by 6.25x until December 20th, 2023, with our bounties for the most critical vulnerabilities reaching $10,000 USD! If you’re an aspiring or current vulnerability researcher, click here to sign up. (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL663prCCW7Y8-PT6lZ3mrW4GF2lw7GmLpRN6LsfZWbrxPRW1TcRC13-h-2fN6ZVLFhYl1ksW36C5M02szcVNW1YLHRK5cBbKYW4hJvYT3QYqdFW6JC4DG2yPCsVW6vY6TG8x5gYlW1RgZqt10trB-W8FT_rj70Wx8vW4wRxy86lsNwNW65-tkN2msqt8W323byH57yf4RVDCB4P7xZc4JW852WrC8ksNgxW6rjR154G6xD1W5mFqqs1R7B2DW3-VmDQ5Y-PvkN5jBP_3LgrX8W2w6q9R2JSLMNW2-1hl_5ry22VW50zYqp5D8xgfW3d-PZN2MLmHVVcpKPy51-T1TW8K-_sG94JL3Kf1nYmnd04 )

The Full Product Lineup

wf-stacked-free-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL663prCCW7Y8-PT6lZ3pcW1QzX1n4T9RR6W4WLP7-7Frb4dW2gMWyJ5_xFr5W1gqN-68FtlP7VWh8R36K4Nl5W8Br4sJ4j1G3RW343W0k89syvkW5QSdsS3qngX4W8Zz3bR2W5yPfW8z88nc91MbGBW8pfb3N7Dl8_3W862j3_2Mfj69W1HnVrn4DbzrwW2N-pM57WDpjGW6MPHG_5LYKqwW3b45rq1LbQBTW2W88ts8Z3n-9W58Cw_j6lQF4JW8Rq47y83cTc9W1ZrMFS5xX5J1N3v1cNfqyyJTW8vqZsL3gRW2JVPgkYp13JYC7W6LphXG21tj2GW1XhfRN3tb9l3W8hxTH76PHhXcf2LGtTj04 )

wf-stacked-premium-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL663prCCW7Y8-PT6lZ3q1W45H0GC6WLRBxW395JBf36_FzYW7St1118Bc8t-W98MQLl7qxy11W8z2dW02Vym60W7-g2r22DcbmXW47XT3X5B-rSHW2Qd2RQ1s3cSLW3_N0_j75M2jqW2Nqm5Q3Lrds9W1Px1T61dFwyCW6nn4PF2RxxzPW176HTy5GJBN4W3mn0-D5B9n_lVbcpkd32tp3BW8GkQzS2yTKqnW1CbGBN6XqP81W88DQq55GZb6XW8X4_d_5nJnnqW8lL3Cb12P90KW1g8fsg30zzQ5W5rrxjj7SLqZWW7L18k22L2tyqW4mpgtV2sFQVzW2t8P-y3hkmjxW33yyl63zxCCDf3r_m0d04 )

wf-stacked-care-3 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL663prCCW7Y8-PT6lZ3pGW8Vr8Hv6HGc3WW33r7L45Zmtd6W8-n-XJ1Ct9wpW7XwGwy61f_D8W963K-z837F9DN5t95yWrSx17W3mgFdV4vDpF0W20R2j_22yddHW8CJv01793Nh4W1QCLbM88NBsFW2jdq8c1TyQJrW6LJj7q3YQbPCW1dYsP05lY2ywW4St8cG8nT7rQW5PyR7V5KcfbVW7kMFmz95vR3LW4NGJSK6d1xXRN2_rchPSndGNW6ygsLB7KhKPlW4fJy_G78fQhpN4YBQFC-DH9LW5YfS5h24Clq1VcC3GB12WY6fW1r4_gf5bWFsDW4ry9xD92WHMfW3cgtRZ8BcmXcf7RdxjW04 )

wf-stacked-response-2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL663prCCW7Y8-PT6lZ3kBW8J725G7n44zCW11bNg248pKGDW2H9q2F7kwQydW612hRf3cwDLgW6kXcFS6JH-GzW8T5rh37w3kjnW2d61VG2FRSXLW8vc9Z71qGYx2W7fpFxz7vRXTzW8KH-gh8-JdSNW6QZ2JT3FdNRRW95DS8P5zWVv-W7JFls1737MllW8LwlYZ21VJcKVsKPCl59GG32W1SSzW77b_rdmW5NM4fw498vSMW2rRq8b5XMSbKW8d1LDB1mHgx4W82-Wc7534rW0W4f2Zcl887J3nW6B692h6Fgp8qW6MGN904QHFc_W78-ldb7b4-n2W8WlC3D1c55SzN7jtmrJKs7_Qf4CK7bs04 )

wf-stacked-cli (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL663prCCW7Y8-PT6lZ3l8W5bT78N1Kt0l-W5k6R_F4wr9X1W4bJlVY2q2GfwW7BQTXz4Ms489W8gq20W6d-2kkW2GVZmL2KlRMRV6rB0s3vT8dHW47yBGp7DXZsHW3Mmyx-10z7C1W40chZp280Qs6W7QF3mz7Qt0ldW1y2xSX6bpd0sW6DjVpT970lwwW80QcMc4McD6cW6qyw4k3Z6xhxW7m3T5s7pKHTTW4XLD2H2J5PJ_W2tgwn43-lmJJW1j29ZT5D-KYcW6TQwBq5MrCqDVj-xz45PqB8TW8mBhv73Xz60XW2xM_2p5YWQ6nW6XNlS_57XBLSW6dw92X90QQVLW66pfMF5hfYvpdGQDwY04 )

wf-stacked-intelligence (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL5R3prCCW7lCdLW6lZ3kMW2J-QRZ8wn0hvW4ZgfWq9kGM7-W3ztG5Q8nbsbqW20V1Cf72Zj-SW2hq47w5DDL9vVfT79G5dV9nPW5lgv1G4W260-VDt9LS4BhMKSVmdrRx7Q8xg1W7vJL6y8_ynLpV8TP3z1gk6kDW8wB1dq5nVd-jW7kGfyX8tmz0QN2C1ZsB_jMHLW8Cx-TW5pnQ-YW3jWzCZ1FJdyTW409bnV4dzx29W92dHzT2kndykW6KCTBr5xyHTNW4xlczH2Sjhn5VyvMjp36MwrBVxfM4r8vPrjgVY5CW698qmmSW4jLK0K4ch1sQf24NCYx04 )

logo-defiant (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL5x3prCCW6N1vHY6lZ3m0W7C8-SK4m-4RXW3gYGdF1YXPtgW6rFlFp1Ww7XyW1WyvSR4Q1ycLW1G4Ll37VtGnsW5v64G-3_v36nW68z-yr7-grNgW5b3Hsk73jtdjW7BMjc04HxcWHW42pfTk2_K_rtW2snrm36cZ0RjW2dLPW08Zk8N9W8-P1Y03Q6QKtW2CkzT_2-DbhnW4t2WWY3PrdSVN4944PDDcrY6W39lrSm5KcK7VN1VTQ1485P6MW2wV8rr5cPmGkW8cCKkL8gwHC0W4xhC3b6Kx1GXW84Yc1f6g-0ZRdmS1Wn04 )

Defiant, Inc., 1700 Westlake Ave N STE 200

Seattle, WA 98109 United States

Unsubscribe (https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcMTW4S_G476HjbvMV25wF_6PdNf8W83VMZz8xPy7SN776-0N1yf0NW30tvvs5sGdD3W94TWcv6dGq1dn30BDhy483&v=3&_hsenc=p2ANqtz-9q0j8PdQIvbeRfP7sbj-_fO17LMdUZGWpXK7zi096CtsqlUypTvPp_irz2B5vIPCZ6IRPt1RRx8WKT8Ed_P0dYWWo2GQ&_hsmi=285092561 ) Manage Preferences (https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcMTW4S_G476HjbvMV25wF_6PdNf8W83VMZz8xPy7SN776-0N1yf0NW30tvvs5sGdD3W94TWcv6dGq1dn30BDhy483&v=3&_hsenc=p2ANqtz-9q0j8PdQIvbeRfP7sbj-_fO17LMdUZGWpXK7zi096CtsqlUypTvPp_irz2B5vIPCZ6IRPt1RRx8WKT8Ed_P0dYWWo2GQ&_hsmi=285092561 )

ISO_27001 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW8M9R365Zh-W6W13936DyvZjVZjc4S56FKbCN8wLL5x3prCCW6N1vHY6lZ3kwW94JpZC90cDr9W2nWSL49k2-glW82jwzc5WhBPyW2szQr84705m4W96sVtZ93MnWwW6RkZk77qffy_W58RQgS6zQTl4W33y9Hh4k6WzrW4B1rCT2FdZ-nW2w3Cwl8NxR9JW1sxFP93bmY6JW8MNSkn2J9kDJW3DYG_F8-qnk4W3k8sYN2xbGJzW7FfM9y2phfJZW5CsWg44vcYQRW4gGZmS5HCsL-W50DFTc2HVTfLW4wQLLk3YvdB6W1Hl0QS7rRCMmW3rJtMB2s_J59W55ltrY11J0Ggf3zPhsH04 )

You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Mon Dec 04 2023 - 16:26:43 CET

This archive was generated by hypermail 2.3.0 : Mon Dec 04 2023 - 16:33:23 CET