Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1302 WordPress 5.7.1 Security and Maintenance Release 16 April 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: WordPress Publisher: WordPress Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Access Confidential Data -- Unknown/Unspecified Reduced Security -- Unknown/Unspecified Resolution: Patch/Upgrade Original Bulletin: https://wordpress.org/news/2021/04/wordpress-5-7-1-security-and-maintenance-release/ - --------------------------BEGIN INCLUDED TEXT-------------------- WordPress 5.7.1 Security and Maintenance Release Posted April 15, 2021 by Peter Wilson . Filed under Releases , Security . WordPress 5.7.1 is now available! This security and maintenance release features 26 bug fixes in addition to two security fixes. Because this is a security release , it is recommended that you update your sites immediately. All versions since WordPress 4.7 have also been updated. WordPress 5.7.1 is a short-cycle security and maintenance release. The next major release will be version 5.8. You can download WordPress 5.7.1 by downloading from WordPress.org, or visit your Dashboard -> Updates and click Update Now. If you have sites that support automatic background updates, they've already started the update process. Security Updates Two security issues affect WordPress versions between 4.7 and 5.7. If you haven't yet updated to 5.7, all WordPress versions since 4.7 have also been updated to fix the following security issues: o Thank you SonarSource for reporting an XXE vulnerability within the media library affecting PHP 8. o Thanks Mikael Korpela for reporting a data exposure vulnerability within the REST API. Thank you to all of the reporters for privately disclosing the vulnerabilities . This gave the security team time to fix the vulnerabilities before WordPress sites could be attacked. Props to Adam Zielinski , Pascal Birchler , Peter Wilson , Juliette Reinders Folmer , Alex Concha , Ehtisham Siddiqui , Timothy Jacobs and the WordPress security team for their work on these issues. For more information, browse the full list of changes on Trac, or check out the version 5.7.1 HelpHub documentation page . Thanks and props! The 5.7.1 release was led by @peterwilsoncc and @audrasjb . In addition to the security researchers and release squad members mentioned above, thank you to everyone who helped make WordPress 5.7.1 happen: 99w , Adam Silverstein , Andrew Ozz , annalamprou , anotherdave , Ari Stathopoulos , Ayesh Karunaratne , bobbingwide , Brecht , Daniel Richards , David Baumwald , dkoo , Dominik Schilling , dragongate , eatsleepcode , Ella van Durpe , Erik , Fabian Pimminger , Felix Arntz , Florian TIAR , gab81 , Gal Baras , Geoffrey , George Mamadashvili , Glen Davies , Greg Ziolkowski , grzim , Ipstenu (Mika Epstein) , Jake Spurlock , Jayman Pandya , Jb Audras , Joen A. , Johan Jonk Stenstrom , Johannes Kinast , John Blackbourn , John James Jacoby , Jonathan Desrosiers , Josee Wouters , Joy , k3nsai , Kelly Choyce-Dwan , Kerry Liu , Marius L. J. , Mel Choyce-Dwan , Mikhail Kobzarev , mmuyskens , Mukesh Panchal , nicegamer7 , Otshelnik-Fm , Paal Joachim Romdahl , palmiak , Pascal Birchler , Peter Wilson , pwallner , Rachel Baker , Riad Benguella , Rinat Khaziev , Robert Anderson , Roger Theriault , Sergey Biryukov , Sergey Yakimov , SirStuey , stefanjoebstl , Stephen Bernhardt , Sumit Singh , Sybre Waaijer , Synchro , Terri Ann , tigertech , Timothy Jacobs , tmatsuur , TobiasBg , Tonya Mork , Toru Miki , Ulrich , and Vlad T . - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYHkoG+NLKJtyKPYoAQgWug//XDcyKlxWoMQpW1VS7GBXb3qrC3h1ZpND wgq4/qJW6slY78xwvFfn3MU4kJJcWTGbNDV8DsWOXVIKY4gXW9Q5XH80le9Q0ox0 NoQa8DUlpG3TUVq9nVQ82aYMj7D40jSaIbSBiFwYqRO9wDpR0TvAyApAR6nu/DKC jr198TVkyqPDAlJ004yZEb9YejkwhfxmtgnslYMmm7tA+/OBc3NAp/vkwNgHfg1j 1A0dcnUqn3EUfiKWSEzvUl18PCtt1FQ4Dy1gEzULg1jQr0Fy4kqdOFv3xfooDWni m8Ss7LndaP3RTpmSKSNORCUkaPrdIyHOSHstBpA0rquWe1TwqQ0OGkHVqTD5YYfJ 21hDRKt3qz5Ldzn00lbMnAdAXDEnoWset9vfiSJOQih0LJuOmAofVkHDgmleVCUl TzWNRzR1URjFs0R7Xko6Zw4GMXZzNOgElDw/yraHW8HnZznh9mSBcNmJCx8g2nIq kRmAtDtOn+CSHPNYkZsySXnIhjv8t2vdX8AWWrDlsEZtZqmF1vmhjSw7WM936JZ9 pLOwgKnmlTsy3Yfcis0iYoASnj/dtZQbTZ7R5JFOH5TotxXpz5xRAZ9iIDfG1Uyk Eb+tUJ2lizwWLTaxKTmrE4lWg7whTyoW6ZOS4T1VIczJkHx6xMgkUYzoF7Tw3TvM Rk0I8iVR2hQ= =4li2 -----END PGP SIGNATURE-----