Update your WordPress to 4.7.1 to close 8 new vulnerabilities.

If you’re hosting your wordpress you must upgrade to the latest version 4.7.1 to close new 8 vulnerabilities listed below.

WordPress versions 4.7 and earlier are affected by eight security issues:

  1. Remote code execution (RCE) in PHPMailer – No specific issue appears to affect WordPress or any of the major plugins we investigated but, out of an abundance of caution, we updated PHPMailer in this release. This issue was reported to PHPMailer by Dawid Golunski and Paul Buonopane.
  2. The REST API exposed user data for all users who had authored a post of a public post type. WordPress 4.7.1 limits this to only post types which have specified that they should be shown within the REST API. Reported by Krogsgard and Chris Jean.
  3. Cross-site scripting (XSS) via the plugin name or version header on update-core.php. Reported by Dominik Schilling of the WordPress Security Team.
  4. Cross-site request forgery (CSRF) bypass via uploading a Flash file. Reported by Abdullah Hussam.
  5. Cross-site scripting (XSS) via theme name fallback. Reported by Mehmet Ince.
  6. Post via email checks mail.example.com if default settings aren’t changed. Reported by John Blackbourn of the WordPress Security Team.
  7. A cross-site request forgery (CSRF) was discovered in the accessibility mode of widget editing. Reported by Ronnie Skansing.
  8. Weak cryptographic security for multisite activation key. Reported by Jack.

WordPress.org posted yesterday a security and maintenance release to address these vulnerabilities. Don’t be the next victim, patch them as soon as possible.

The update is straight forward, no issue when I updated my own wordpress websites. I simply copied the new release 4.7.1 to my hosting files.

Related: WordPress – Fatal error: Call to a member function do_all_hook() on a non-object in /home/public_html/wp-includes/plugin.php on line 837

When I wrote this article, WordPress 4.7 has been downloaded 17+ millions and counting. This is the approximate numbers that can be compromise if they don’t apply patches soon.

Malicious Hackers are always waiting for this kind of opportunity. Don’t be a victim, apply the latest security patch asap.

Support @QUE.COM

Founder, QUE.COM Internet Media. | Founder, Yehey.com a Shout for Joy! | MAJ.COM Management of Assets and Joint Ventures. More at KING.NET Ideas to Life.

2 thoughts on “Update your WordPress to 4.7.1 to close 8 new vulnerabilities.

  • February 12, 2017 at 4:05 pm
    Permalink

    millerhighschool.nsw.edu.au – cannot access their website. The following message appear:Fatal error: Call to undefined function get_currentuserinfo() in /websites/mi/millerhighschool.nsw.edu.au/wp-content/plugins/event-calendar-scheduler/scheduler.php on line 61

    Reply

Leave a Reply

Discover more from QUE.com

Subscribe now to keep reading and get access to the full archive.

Continue reading