<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Leland Dieno</title>
    <description>The latest articles on DEV Community by Leland Dieno (@lelanddieno).</description>
    <link>https://dev.to/lelanddieno</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1253011%2Fda681c60-8069-46cf-952e-0c9202786a87.jpg</url>
      <title>DEV Community: Leland Dieno</title>
      <link>https://dev.to/lelanddieno</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/lelanddieno"/>
    <language>en</language>
    <item>
      <title>Wordpress SCAM Plugin Being Sent to Site Owners</title>
      <dc:creator>Leland Dieno</dc:creator>
      <pubDate>Wed, 10 Jan 2024 17:16:28 +0000</pubDate>
      <link>https://dev.to/lelanddieno/wordpress-scam-plugin-being-sent-to-site-owners-1l2e</link>
      <guid>https://dev.to/lelanddieno/wordpress-scam-plugin-being-sent-to-site-owners-1l2e</guid>
      <description>&lt;p&gt;Hey everyone,&lt;/p&gt;

&lt;p&gt;Most of you probably already know about this, but several of my clients received the below email. Turns out this is a fake URL (looks legit to the average person) and its a malicious plugin.&lt;/p&gt;

&lt;p&gt;Dear user&lt;br&gt;
The WordPress Security Team has identified a critical vulnerability on the website: CLIENTSWEBSITE.COM&lt;/p&gt;

&lt;p&gt;The Remote Code Execution (RCE) vulnerability identified on your site is classified as a critical threat, potentially allowing malicious code execution and putting your data, user details, and overall site security at risk.&lt;/p&gt;

&lt;p&gt;We advise you to apply the CVE-2024-46188 Patch immediately, while we are working on fixing this critical security concern in the next WordPress version.&lt;/p&gt;

&lt;p&gt;Simply download the plugin by clicking the button below, install and activate it on your site. This guarantees prompt and trouble-free defense against potential exploits and malicious actions linked to this vulnerability.&lt;/p&gt;

&lt;h1&gt;
  
  
  wordpress
&lt;/h1&gt;

&lt;h1&gt;
  
  
  scams
&lt;/h1&gt;

&lt;h1&gt;
  
  
  maliciouscode
&lt;/h1&gt;

</description>
    </item>
  </channel>
</rss>
