17 May 2023
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.2867 WordPress 6.2.1 Maintenance & Security Release 17 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: WordPress Publisher: WordPress Operating System: Windows UNIX variants (UNIX, Linux, OSX) Resolution: Patch/Upgrade Original Bulletin: https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/ Comment: CVSS (Max): None available when published - --------------------------BEGIN INCLUDED TEXT-------------------- WordPress 6.2.1 Maintenance & Security Release WordPress 6.2.1 is now available! This minor release features 20 bug fixes in Core and 10 bug fixes for the block editor . You can review a summary of the maintenance updates in this release by reading the Release Candidate announcement . This release also features several security fixes. Because this is a security release, it is recommended that you update your sites immediately. All versions since WordPress 4.1 have also been updated. WordPress 6.2.1 is a short-cycle release. The next major release will be version 6.3 planned for August 2023. If you have sites that support automatic background updates, the update process will begin automatically. You can download WordPress 6.2.1 from WordPress.org , or visit your WordPress Dashboard, click "Updates", and then click "Update Now". For more information on this release, please visit the HelpHub site . Security updates included in this release The security team would like to thank the following people for responsibly reporting vulnerabilities, and allowing them to be fixed in this release. o Block themes parsing shortcodes in user generated data; thanks to Liam Gladdy of WP Engine for reporting this issue o A CSRF issue updating attachment thumbnails; reported by John Blackbourn of the WordPress security team o A flaw allowing XSS via open embed auto discovery; reported independently by Jakub Zoczek of Securitum and during a third party security audit o Bypassing of KSES sanitization in block attributes for low privileged users; discovered during a third party security audit. o A path traversal issue via translation files; reported independently by Ramuel Gall and during a third party security audit. Thank you to these WordPress contributors This release was led by Jb Audras , George Mamadashvili , Sergey Biryukov and Peter Wilson . WordPress 6.2.1 would not have been possible without the contributions of the following people. Their asynchronous coordination to deliver maintenance and security fixes into a stable release is a testament to the power and capability of the WordPress community. Adam Silverstein , Aki Hamano , amin , Andrew Ozz , Andrew Serong , Andre , Ari Stathopoulos , Birgit Pauli-Haack , Chirag Rathod , Colin Stewart , Daniel Richards , David Baumwald , David Binovec , Dennis Snell , devshagor , Dhrumil Kumbhani , Dominik Schilling , Ella , George Mamadashvili , Isabel Brison , Jb Audras , Joe Dolson , Joen A. , John Blackbourn , Jonathan Desrosiers , JuanMa Garrido , Juliette Reinders Folmer , Kai Hao , Kailey (trepmal) , Marc , Marine EVAIN , Matt Wiebe , Mukesh Panchal , nendeb , Nick Diego , nickpap , Nik Tsekouras , Pavan Patil , Peter Wilson , pouicpouic , Riad Benguella , Ryan Welcher , Scott Reilly , Sergey Biryukov , Stephen Bernhardt , tmatsuur , TobiasBg , Tonya Mork , Ugyen Dorji , Weston Ruter , and zieladam . - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to email@example.com and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: firstname.lastname@example.org Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZGRp1ckNZI30y1K9AQiPAw//b4wbExI/XZf+jP5v3CDenoe6OqVtAzvP 0BOCxOH65cZkr4iLWMg10Z6tnQeimw26t4hqvBGuwfBBCbFGv6vWJDRdXhyUxyy5 JUaU7hfQuaqWLn6o6noX/f0ZL/gfQAq7GNPcmB3J9F15NRjnBWKFRlhN5Nl7AM8v Cw8QjlHq+7H5TLb+NgZd55I3tr9CbiFijNEVkWoP/UBwTlamMweWWqrrnWS2nZnK Dz9h5mJOtkad9LQeHfNnCl9X1OPscjUK06rlvsmYdhr3rHzTgXFHKSoHUJViV8WC y89O2PyhejmIZYSzwaLIRWsyDU5rmooB0eWbKNHkDWGUKUhtM4zPgFLj2z+yiADT gY4nasX8bhUAmjOxQcog0YaL5VhkEUXUtE/GEaNaRDJMYhQH+LTjCEy5RZgcg/N3 Anx871Z4rBCtknNlgsu0eZqUzS9Bf9mMaSSzguB1hhHwG8LalEWXcmmdsQnldCLk e+HNPG/FK0e9iAXEtudcGULEHauq+es1D68aLXtvh1T50keDu1G5NMSOov+Q0qLx UmZbHNWyUvjlmPt/vqxq5iY2mhChz3IBb1Kj8/F2YMNIpa6lmZh7T30mrbxDgYR3 3rowHfMwJENKzXuhs/AsiAxmoWSCXImeRBYp8vgseO85KAPDynm5AcKNJST+GdQ1 tOKZG29W8Dk= =ARp5 -----END PGP SIGNATURE-----