-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.6291
                     WordPress 6.0.3 Security Release
                              2 December 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           WordPress
Publisher:         WordPress
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/

Comment: CVSS (Max):  None available when published

- --------------------------BEGIN INCLUDED TEXT--------------------

WordPress 6.0.3 Security Release

WordPress 6.0.3 is now available!

This release features several security fixes. Because this is a security
release , it is recommended that you update your sites immediately. All
versions since WordPress 3.7 have also been updated.

WordPress 6.0.3 is a short-cycle release. The next major release will be
version 6.1 planned for November 1, 2022.

If you have sites that support automatic background updates, the update process
will begin automatically.

You can download WordPress 6.0.3 from WordPress.org , or visit your WordPress
Dashboard, click "Updates", and then click "Update Now".

For more information on this release, please visit the HelpHub site .

Security updates included in this release

The security team would like to thank the following people for responsibly
reporting vulnerabilities, and allowing them to be fixed in this release.

  o Stored XSS via wp-mail.php (post by email) - Toshitsugu Yoneyama of Mitsui
    Bussan Secure Directions, Inc. via JPCERT
  o Open redirect in `wp_nonce_ays` - devrayn
  o Sender's email address is exposed in wp-mail.php - Toshitsugu Yoneyama of
    Mitsui Bussan Secure Directions, Inc. via JPCERT
  o Media Library - Reflected XSS via SQLi - Ben Bidner from the WordPress
    security team and Marc Montpas from Automattic independently discovered
    this issue
  o CSRF in wp-trackback.php - Simon Scannell
  o Stored XSS via the Customizer - Alex Concha from the WordPress security
    team
  o Revert shared user instances introduced in 50790 - Alex Concha and Ben
    Bidner from the WordPress security team
  o Stored XSS in WordPress Core via Comment Editing - Third-party security
    audit and Alex Concha from the WordPress security team
  o Data exposure via the REST Terms/Tags Endpoint - Than Taintor
  o Content from multipart emails leaked - Thomas Kraftner
  o SQL Injection due to improper sanitization in `WP_Date_Query` - Michael
    Mazzolini
  o RSS Widget: Stored XSS issue - Third-party security audit
  o Stored XSS in the search block - Alex Concha of the WP Security team
  o Feature Image Block: XSS issue - Third-party security audit
  o RSS Block: Stored XSS issue - Third-party security audit
  o Fix widget block XSS - Third-party security audit

Thank you to these WordPress contributors

This release was led by Alex Concha , Peter Wilson , Jb Audras , and Sergey
Biryukov at mission control. Thanks to Jonathan Desrosiers , Jorge Costa ,
Bernie Reiter and Carlos Bravo for their help on package updates.

WordPress 6.0.3 would not have been possible without the contributions of the
following people. Their asynchronous coordination to deliver several fixes into
a stable release is a testament to the power and capability of the WordPress
community.

Alex Concha , Colin Stewart , Daniel Richards , David Baumwald , Dion Hulse ,
ehtis , Garth Mortensen , Jb Audras , John Blackbourn , John James Jacoby ,
Jonathan Desrosiers , Jorge Costa , Juliette Reinders Folmer , Linkon Miyan ,
martin.krcho , Matias Ventura , Mukesh Panchal , Paul Kevan , Peter Wilson ,
Robert Anderson Robin , Sergey Biryukov , Sumit Bagthariya , Teddy Patriarca ,
Timothy Jacobs , vortfu , and Ceslav Przywara .

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBY4mAZckNZI30y1K9AQgfBA/9Huk2MO0vzHBDi3BuM6Mr3kbyUkLw5HC+
ZQwtzmWgGvqKA460UHl2ZhdKbpGXmEVawNCV0LAa5b3ckZLdPzEks7As0PyjmelE
8lqfR43ubaB7KJ7vuIsKdYOLrA0hmNdIwZZVy2q371fZccnA/JLF+AWqtw60JpU+
733saI/NuL/eZE2LRmEuCOwBkrH/eot4MqmswDJRIy7wSnlV8rtJgBjcoSn2pTCr
GskDQ6N3vhKscg/FaNnaNIGeYer2XZssQk8w4SBMtpI2Oi8BTf4JY+kntembo75B
fSUirx4u/F5gCYr+GlS6EZ9B3tEcalOVnsi11TaViHsT4Yez31Vqc+0e4O8Dq39r
HZ6fOmRToL9qjQfseLVf83CmjyYkENnFR5gLoo8IUs4WHU0TFw6yRYZW3O/7+Rx8
TuooCSHkRjEBgaGth/qJafMaG/65kxQH4Re5+RF7LbUpeLOL2VH4ICSZhcyJTAcf
Voba/h5Z98uhfrPPfEu7sca5aAUXR9WWrda3WC6/HqI1b9s2v8POCcg1n4MuBpPc
UVIU/S8m1vtuh4o/kRdOWZg8KoigcYVLY8CbCHiT+bdK5A/LncE35lXYsB2+oU1e
UHm/IxPJCYiJN1C5e0Z7ceQFNWuMqIOXQyN4/cGQ4wFdZBSw5KVe9We1ihjIzLiX
6LQcrTU3QjM=
=EiOc
-----END PGP SIGNATURE-----