Investigating - We are aware of an increase in email delivery issues affecting messages sent from Microsoft 365/Outlook to Premium Business email-hosted mailboxes. Some emails may bounce or be delayed due to Microsoft IP addresses appearing on the SenderScore blocklist.
If you are experiencing this issue, you can resolve it by safelisting Microsoft's sending IP addresses at the mailbox level: 1. Go to cp.rackspace.com > Domains > Spam settings > Safelists 2. Select your domain 3. Add the following IP ranges: 52.102.%.% 40.107.%.% 52.101.%.% 52.103.%.%
We are actively working with our partners to determine if fleet-wide mitigations can be applied. We will provide updates as more information becomes available.
If you have any questions or concerns, please don't hesitate to contact us via Live Chat or by opening a case.
Dec 16, 2025 - 17:16 EST
We will be performing scheduled network maintenance to apply updates that enhance the long-term performance, stability, and security of our infrastructure. During this window, our teams will also complete validation and testing to ensure all recent changes continue to operate as expected across our data center network systems.
No customer impact is expected during this maintenance period. All work is being performed under strict change controls and will be closely monitored by our engineering teams to ensure a smooth and seamless experience.
We appreciate your patience and understanding. If you need any assistance, our Support Team is available 24/7 via Live Chat or at support@liquidweb.com Posted on
Dec 05, 2025 - 12:25 EST
Resolved -
This incident has been resolved.
Dec 31, 14:25 EST
Monitoring -
The access to my.liquidweb.com and https://login.liquidweb.com customer portals are functioning as expected at this time. We are monitoring the situation closely.
If you have any questions, please contact a member of our support team via live chat, ticket, or by phone at (800)-580-4985, or (517)-322-0434 (international).
Dec 31, 08:22 EST
Investigating -
We are currently investigating an issue affecting access to the My.liquidweb.com portal. This status post will be updated as more information becomes available.
If you have any questions, don't hesitate to get in touch with a member of our support team via live chat, ticket, or by phone at (800)-580-4985, (517)-322-0434 (international).
Dec 31, 07:51 EST
Resolved -
This issue has been resolved. Webmail is now accessible, and we are no longer experiencing any further problems.
Again, thank you for your patience! If you have any questions, please get in touch with a member of our support team via live chat or case.
Dec 29, 21:02 EST
Monitoring -
Our email vendor has implemented a fix for the Premium Business Email webmail access issue, and service access is being restored. We are currently monitoring the situation to ensure stability.
Email delivery continues to function normally. We will provide further updates if needed.
If you have any questions, please contact our support team via LiveChat or by submitting a case.
Dec 29, 14:38 EST
Investigating -
We are currently experiencing issues with accessing the Premium Business Email webmail interface. We are actively working with our email provider to resolve this as quickly as possible.
Please note that email delivery is not currently affected. We will continue to post updates here as more information becomes available.
If you have any questions, please contact our support team via LiveChat or by submitting a case.
Dec 29, 12:35 EST
Resolved -
We’ve completed the update process for the affected W3TC plugin on sites that meet the required WordPress and PHP versions.
For sites that did not meet the requirements and the server which is not accessible, we’ve contacted affected customers directly via support cases, as the update could not be applied safely at this time & We recommend that they review their all sites on the server and manually update the W3TC plugin to version 2.8.14 or higher, if it has not already been updated, as exploit details are now publicly available.
Our support team is available. If you have any questions or concerns, please don't hesitate to contact our support team through a ticket in your portal or via live chat.
Dec 22, 09:13 EST
Update -
Our teams are nearing the completion of the W3 Total Cache (W3TC) plugin update rollout across all eligible sites. The majority of sites running vulnerable or outdated versions have already been successfully updated.
We are now finalizing reviews on the remaining sites where updates could not be automatically applied. In these cases, customer involvement may be required (for example, due to outdated PHP or WordPress versions, or access limitations). We will reach out directly to affected customers to review their hosting environment and update the plugin.
We continue to recommend that all customers review their sites and manually update the W3TC plugin to version 2.8.14 or higher, if it has not already been updated, as exploit details are now publicly available.
We’ll share a final update once this process is fully complete.
If you have any questions or concerns, please don't hesitate to contact our support team through a ticket in your portal or via live chat.
Dec 18, 08:59 EST
Update -
As shared in our earlier update, our teams are continuing to roll out the W3 Total Cache (W3TC) plugin update on sites that meet the minimum requirements. We’ve already been able to successfully update many sites running vulnerable or outdated versions, and this work is still in progress across the fleet.
We’re also reviewing the remaining sites to determine where the update can be safely applied. In some cases, factors like outdated PHP/WordPress versions or limited server access may prevent the update from completing. For those situations, we will follow up directly with customers once our review is finished.
We still strongly encourage all customers to review their sites and manually update the W3TC plugin if needed, as details about the exploit have already been made public.
Further updates will be shared as progress continues.
Dec 10, 15:10 EST
Update -
We have successfully applied the W3 Total Cache (W3TC) plugin update to thousands of customer sites where an outdated installation was identified and the environment met the minimum requirements for the upgrade. Our teams are continuing to review the hosting fleet and will apply updates wherever possible.
In most cases, we are able to complete the update for our customers. However, several common blockers have prevented updates on some sites, including:
Outdated PHP versions (older than PHP 7.2.5)
Outdated WordPress installations (earlier than WordPress 5.3)
Restricted or limited server access
Once our update efforts are complete, we will contact customers whose environments contain a vulnerable W3TC installation that we were able to identify but could not be updated automatically, so that they and their teams can take any required remediation steps.
We strongly recommend that all customers review their hosting environments and update the plugin as soon as possible, as a proof-of-concept for the exploit has been publicly released.
Dec 2, 16:17 EST
Update -
Our team is actively involved in updating the W3 Total Cache (W3TC) plugin to the latest version for all sites running W3TC version 2.8.13 or earlier, as part of the ongoing remediation for CVE-2025-9501.
We are closely monitoring all systems throughout this process to ensure the updates are applied successfully and to verify that there is no customer impact.
Further updates will be shared as progress continues.
Nov 21, 08:04 EST
Identified -
Our team will be updating the W3 Total Cache (W3TC) plugin on WordPress sites where the installed version is lower than 2.8.13. This update addresses CVE-2025-9501, a critical security vulnerability.
A fixed version is available in W3TC 2.8.13 and later. To ensure the continued security and stability of your sites, our engineering team will apply this update.
We do not anticipate any downtime during this process.
No action is required on your part. Our team will monitor the update closely to ensure your sites remain fully functional. We appreciate your co-operation as we take this proactive step to protect your sites.
Resolved -
This incident has been resolved.
Dec 18, 17:50 EST
Monitoring -
The engineering team has successfully completed the necessary maintenance, and full access to the VMware Cloud Director portal has been restored.
All management portal functionalities are now fully operational.
We are continuing to monitor the environment to ensure sustained stability.
As noted throughout the incident, all virtual server workloads remained unaffected and fully operational during this period.
Dec 18, 15:41 EST
Identified -
We have successfully identified the root cause of the 503 errors affecting access to the VMware Cloud Director portal. Our engineering team is currently applying a fix to restore full access.
Portal Access: Users may continue to experience 503 errors when attempting to log in to the management interface.
Server Stability: All existing virtual servers and workloads hosted on VMware remain fully operational and unaffected. This issue is strictly limited to the management portal interface.
We will provide another update as soon as the fix has been fully implemented and verified.
Dec 18, 15:20 EST
Investigating -
We are currently investigating an issue where the VMware Cloud Director portal is returning a 503 error, making it temporarily inaccessible. Our engineering team is actively working to restore service as quickly as possible.
We understand the importance of this tool to your operations and will provide regular updates as we move toward a resolution.
Dec 18, 14:11 EST