High Severity

Link: WordPress admin targeting with recipient identifier in URL fragment

Description

Detects messages containing links to WordPress administrative paths (wp-admin, wp-content, wp-includes, etc.) where the URL fragment contains base64-encoded data that includes the recipient's email address, indicating potential targeted compromise attempts.

References

No references.

Sublime Security
Created Apr 16th, 2026 • Last updated Apr 16th, 2026
Source
type.inbound
and any(body.links,
        regex.icontains(.href_url.path,
                        '^\/(?:wp-(?:admin|includes|content|login|json|signup|activate|cron|mail)|xmlrpc\.php)'
        )
        // base64 encoded
        and (
          any(strings.scan_base64(.href_url.fragment),
              strings.icontains(., recipients.to[0].email.email)
          )
          // not base64
          or strings.icontains(.href_url.fragment, recipients.to[0].email.email)
        )
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Deploy and integrate a free Sublime instance in minutes.
Get Started