A number of my clients asked, “Have you updated my WordPress today?”
Answer: Yes.
As part of our HackGuard.com service, whenever a security release is posted, we work to ensure all of our client’s sites are updated same day.
Why this week?
WordPress 6.0.3 Security Release was posted this week.
Over 16 patches were made in this WordPress release:
1 Stored XSS via wp-mail.php
– contributed by Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. via JPCERT
2 Open redirect in `wp_nonce_ays`
– contributed by devrayn
3 Sender’s email address is exposed in wp-mail.php
– contributed by Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. via JPCERT
4 Media Library
– Reflected XSS via SQLi
– contributed by Ben Bidner from the WordPress security team and Marc Montpas from Automattic independently discovered this issue
5 CSRF in wp-trackback.php
– contributed by Simon Scannell
6 Stored XSS via the Customizer
– contributed by Alex Concha from the WordPress security team
7 Revert shared user instances introduced in 50790
– contributed by Alex Concha and Ben Bidner from the WordPress security team
8 Stored XSS in WordPress Core via Comment Editing
– contributed by Third-party security audit and Alex Concha from the WordPress security team
9 Data exposure via the REST Terms/Tags Endpoint
– contributed by Than Taintor
10 Content from multipart emails leaked
– contributed by Thomas Kräftner
11 SQL Injection due to improper sanitization in `WP_Date_Query`
– contributed by Michael Mazzolini
12 RSS Widget: Stored XSS issue
– contributed by Third-party security audit
13 Stored XSS in the search block
– contributed by Alex Concha of the WP Security team
14 Feature Image Block: XSS issue
– contributed by Third-party security audit
15 RSS Block: Stored XSS issue
– contributed by Third-party security audit
16 Fix widget block XSS
– contributed by Third-party security audit
Disclaimer:
This post was written by Jim Walker for informational purposes only, was not solicited, nor paid for respectively.