Vulnerabilities in Automattic software