Last week we automatically upgraded all of our web hosting customers to the latest version of WordPress.
This release features security fixes for very rare, but serious threats. It was installed for all of our hosting customers on the same day that it was released by WordPress.org. We strive to deliver you the latest security and stability patches at all times, and we’re happy to say we were able to deliver them same-day again this time.
Here are the details of the update:
- Fixes a possible denial of service issue in PHP’s XML processing, reported by Nir Goldshlager of the Salesforce.com Product Security Team. Fixed by Michael Adams and Andrew Nacin of the WordPress security team and David Rothstein of the Drupal security team.
- Fixes a possible but unlikely code execution when processing widgets (WordPress is not affected by default), discovered by Alex Concha of the WordPress security team.
- Prevents information disclosure via XML entity attacks in the external GetID3 library, reported by Ivan Novikov of ONSec.
- Adds protections against brute attacks against CSRF tokens, reported by David Tomaschik of the Google Security Team.
- Contains some additional security hardening, like preventing cross-site scripting that could be triggered only by administrators.
You shouldn’t notice any changes to the day-to-day functioning or appearance of the WordPress control panel. You should simply know that your site is up to date and secure, thank you!