WordPress released a security and maintenance update today – version 4.8.2, so all Final Design Studios Clients should have received an email notification that this has automatically taken place.
If you have not received an email notifying you of this security update, please get in touch with us and we will get you organised. Call 0203 608 6609 today.
Alternatively, log into your WordPress dashboard and hover your mouse over the DASHBOARD link in the left-hand navigation bar, where you will be presented with a pop-up menu listing UPDATES as one of its items. Click UPDATES then follow the on-screen instructions.
The security update was deployed to address the following issues:
$wpdb->prepare()
can create unexpected and unsafe queries leading to potential SQL injection (SQLi). WordPress core is not directly vulnerable to this issue, but we’ve added hardening to prevent plugins and themes from accidentally causing a vulnerability. Reported by Slavco- A cross-site scripting (XSS) vulnerability was discovered in the oEmbed discovery. Reported by xknown of the WordPress Security Team.
- A cross-site scripting (XSS) vulnerability was discovered in the visual editor. Reported by Rodolfo Assis (@brutelogic) of Sucuri Security.
- A path traversal vulnerability was discovered in the file unzipping code. Reported by Alex Chapman (noxrnet).
- A cross-site scripting (XSS) vulnerability was discovered in the plugin editor. Reported by 陈瑞琦 (Chen Ruiqi).
- An open redirect was discovered on the user and term edit screens. Reported by Yasin Soliman (ysx).
- A path traversal vulnerability was discovered in the customizer. Reported by Weston Ruter of the WordPress Security Team.
- A cross-site scripting (XSS) vulnerability was discovered in template names. Reported by Luka (sikic).
- A cross-site scripting (XSS) vulnerability was discovered in the link modal. Reported by Anas Roubi (qasuar).
To read more details, please visit https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/