-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.2867
              WordPress 6.2.1 Maintenance & Security Release
                                17 May 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           WordPress
Publisher:         WordPress
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/

Comment: CVSS (Max):  None available when published

- --------------------------BEGIN INCLUDED TEXT--------------------

WordPress 6.2.1 Maintenance & Security Release

WordPress 6.2.1 is now available!

This minor release features 20 bug fixes in Core and 10 bug fixes for the block
editor . You can review a summary of the maintenance updates in this release by
reading the Release Candidate announcement .

This release also features several security fixes. Because this is a security
release, it is recommended that you update your sites immediately. All versions
since WordPress 4.1 have also been updated.

WordPress 6.2.1 is a short-cycle release. The next major release will be
version 6.3 planned for August 2023.

If you have sites that support automatic background updates, the update process
will begin automatically.

You can download WordPress 6.2.1 from WordPress.org , or visit your WordPress
Dashboard, click "Updates", and then click "Update Now".

For more information on this release, please visit the HelpHub site .

Security updates included in this release

The security team would like to thank the following people for responsibly
reporting vulnerabilities, and allowing them to be fixed in this release.

  o Block themes parsing shortcodes in user generated data; thanks to Liam
    Gladdy of WP Engine for reporting this issue
  o A CSRF issue updating attachment thumbnails; reported by John Blackbourn of
    the WordPress security team
  o A flaw allowing XSS via open embed auto discovery; reported independently
    by Jakub Zoczek of Securitum and during a third party security audit
  o Bypassing of KSES sanitization in block attributes for low privileged
    users; discovered during a third party security audit.
  o A path traversal issue via translation files; reported independently by
    Ramuel Gall and during a third party security audit.

Thank you to these WordPress contributors

This release was led by Jb Audras , George Mamadashvili , Sergey Biryukov and
Peter Wilson .

WordPress 6.2.1 would not have been possible without the contributions of the
following people. Their asynchronous coordination to deliver maintenance and
security fixes into a stable release is a testament to the power and capability
of the WordPress community.

Adam Silverstein , Aki Hamano , amin , Andrew Ozz , Andrew Serong , Andre , Ari
Stathopoulos , Birgit Pauli-Haack , Chirag Rathod , Colin Stewart , Daniel
Richards , David Baumwald , David Binovec , Dennis Snell , devshagor , Dhrumil
Kumbhani , Dominik Schilling , Ella , George Mamadashvili , Isabel Brison , Jb
Audras , Joe Dolson , Joen A. , John Blackbourn , Jonathan Desrosiers , JuanMa
Garrido , Juliette Reinders Folmer , Kai Hao , Kailey (trepmal) , Marc , Marine
EVAIN , Matt Wiebe , Mukesh Panchal , nendeb , Nick Diego , nickpap , Nik
Tsekouras , Pavan Patil , Peter Wilson , pouicpouic , Riad Benguella , Ryan
Welcher , Scott Reilly , Sergey Biryukov , Stephen Bernhardt , tmatsuur ,
TobiasBg , Tonya Mork , Ugyen Dorji , Weston Ruter , and zieladam .

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=ARp5
-----END PGP SIGNATURE-----