<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>BuddyPress.org | pineapplepalm | Mentions</title>
	<link>https://buddypress.org/members/pineapplepalm/activity/mentions/</link>
	<atom:link href="https://buddypress.org/members/pineapplepalm/activity/mentions/feed/" rel="self" type="application/rss+xml" />
	<description>Activity feed mentioning pineapplepalm.</description>
	<lastBuildDate>Thu, 23 Apr 2026 16:05:29 +0000</lastBuildDate>
	<generator>https://buddypress.org/?v=</generator>
	<language>en-US</language>
	<ttl>30</ttl>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>2</sy:updateFrequency>
	
						<item>
				<guid isPermaLink="false">f5b30088e265f02acdb2902e68493dda</guid>
				<title>Mike Witt replied to the topic Unauthenticated Arbitrary Shortcode Execution Security Vulnerability in the forum Requests &#038; Feedback</title>
				<link>https://buddypress.org/support/topic/unauthenticated-arbitrary-shortcode-execution-security-vulnerability/#post-339012</link>
				<pubDate>Fri, 30 Jan 2026 15:28:11 +0000</pubDate>

									<content:encoded><![CDATA[<p><a href="https://buddypress.org/members/pineapplepalm/" rel="nofollow ugc">@pineapplepalm</a>, The reason it wasn&#8217;t posted until now was because when serious vulnerabilities are found the announcements are held back until patches can be released, and people have already had time to update their sites. Otherwise you&#8217;d be announcing the vulnerabilities to hackers before the fixes had been distributed.</p>
]]></content:encoded>
				
				
							</item>
		
	</channel>
</rss>