Return-path: <010f018c263cae92-94099030-49df-40e6-a2d3-a8fdfced0452-000000@us-east-2.amazonses.com> Envelope-to: lojban@lojban.org Delivery-date: Fri, 01 Dec 2023 08:36:04 -0800 Received: from e226-5.smtp-out.us-east-2.amazonses.com ([23.251.226.5]:35207) by b39ccf38b4ec with esmtps (TLS1.2) tls TLS_RSA_WITH_AES_128_CBC_SHA256 (Exim 4.96) (envelope-from <010f018c263cae92-94099030-49df-40e6-a2d3-a8fdfced0452-000000@us-east-2.amazonses.com>) id 1r96Uj-0054MA-2S for lojban@lojban.org; Fri, 01 Dec 2023 08:36:03 -0800 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=axo7b342ksgqh5wa3mymy57b4tbnad4h; d=mail-wordpress.org; t=1701448560; h=Date:To:From:Reply-To:Subject:Message-ID:MIME-Version:Content-Type; bh=kKOev8AkzMXmV6HXyNEqoByUm8pmBZHs180ZjRVORfw=; b=TLVnmLmdYRtETApnBfA293i+GHlll4id+TF5lnSU0kJSKHZYa1bR/GhcYG/tjVl4 qlDujvFz+U4YhcGNMnio2EcyaaUYnEEMDoCTkvVdh/mkdW601pBJ0XfwSfnZyiA0aTV QjOgqt3GWqxmpep//IRPGqnYKRcfH4j82iK5izxUFkj9eugcWSrxRPjcgbFSBWyqPBG YOYDeKHpBHIbnXxL9+mPi5Moi4oV53HxI6jIAQ8D4/L2HEe7XP+acpXg1fKLMRVtyP8 7tN5mVxbOf29SWBOJ70y8fnYkoodKrI/6CTbRESLmWpF3guCuWtVFGr0dDN8wA6LAcJ C0/z0X2Ctg== DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=kra23psoka5qyyh6gdejiiuof3nluwuz; d=amazonses.com; t=1701448560; h=Date:To:From:Reply-To:Subject:Message-ID:MIME-Version:Content-Type:Feedback-ID; bh=kKOev8AkzMXmV6HXyNEqoByUm8pmBZHs180ZjRVORfw=; b=MU0uYAlwA0U4vBj8GOTF/+2SmCNVnfK1wpCdjxijQbQPAT4Ovsd3DjGwLQujQvSK aIMgVSx/Y2rRzpHAY082oPV1rWzP/Gbn6yXyowDLNxhMXG+gzINsysY2k3z6nZFCdNM /u+smvQ7w17dotFpppR4U0Bo/aUOPyHWbCgdoVoY= Date: Fri, 1 Dec 2023 16:36:00 +0000 To: lojban@lojban.org From: "Wordpress.org" Reply-To: "Wordpress.org" Subject: Critical Risk: CVE-2023-45124 Vulnerability Detected In Your WordPress Site Message-ID: <010f018c263cae92-94099030-49df-40e6-a2d3-a8fdfced0452-000000@us-east-2.amazonses.com> MIME-Version: 1.0 Content-Type: text/html; charset=UTF-8 Feedback-ID: 1.us-east-2.2AgfwZfK6Rybum+m8Z5S9lqDDRo/deXWfCSlWvPp83c=:AmazonSES X-SES-Outgoing: 2023.12.01-23.251.226.5 X-Spam-Score: 2.5 (++) X-Spam_score: 2.5 X-Spam_score_int: 25 X-Spam_bar: ++ X-Spam-Report: Spam detection software, running on the system "50bab00d4276", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see @@CONTACT_ADDRESS@@ for details. Content preview: Dear user, The Wordpress Security Team has detected a Remote Code Excecution (RCE) vulnerability on your site, which allows attackers to add malwares and compromise your data, user informations and more. Content analysis details: (2.5 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: ibb.co] 0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60% [score: 0.5000] 0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to DNSWL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [23.251.226.5 listed in list.dnswl.org] -0.0 SPF_HELO_PASS SPF: HELO matches SPF record 0.2 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail domains are different -0.0 SPF_PASS SPF: sender matches SPF record 0.0 RCVD_IN_MSPIKE_H4 RBL: Very Good reputation (+4) [23.251.226.5 listed in wl.mailspike.net] 0.0 HTML_MESSAGE BODY: HTML included in message 0.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain 1.5 FROM_FMBLA_NEWDOM From domain was registered in last 7 days 0.0 RCVD_IN_MSPIKE_WL Mailspike good senders