Vulnerabilities Details

  • Home
  • Vulnerabilities Details

ZMC-2021.04.16.1400

WordPress: Access confidential data - Unknown/unspecified

Operating System:

[WIN][UNIX/LINUX]

Published:

16th April 2021

Target:

Wordpress


===========================================================================
                         ZMCIRT Vulnerability Bulletin

                            ZMC-2021.04.16.1400
         WordPress: Access confidential data - Unknown/unspecified
                               16th April 2021

===========================================================================
Product:           WordPress
Publisher:         WordPress
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Access Confidential Data -- Unknown/Unspecified
                   Reduced Security         -- Unknown/Unspecified
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://wordpress.org/news/2021/04/wordpress-5-7-1-security-and-maintenance-release/



WordPress 5.7.1 Security and Maintenance Release

Posted April 15, 2021 by Peter Wilson . Filed under Releases , Security .

WordPress 5.7.1 is now available!

This security and maintenance release features 26 bug fixes in addition to two
security fixes. Because this is a security release , it is recommended that you
update your sites immediately. All versions since WordPress 4.7 have also been
updated.

WordPress 5.7.1 is a short-cycle security and maintenance release. The next
major release will be version 5.8.

You can download WordPress 5.7.1 by downloading from WordPress.org, or visit
your Dashboard -> Updates and click Update Now.

If you have sites that support automatic background updates, they've already
started the update process.

Security Updates

Two security issues affect WordPress versions between 4.7 and 5.7. If you
haven't yet updated to 5.7, all WordPress versions since 4.7 have also been
updated to fix the following security issues:

  o Thank you SonarSource for reporting an XXE vulnerability within the media
    library affecting PHP 8.
  o Thanks Mikael Korpela for reporting a data exposure vulnerability within
    the REST API.

Thank you to all of the reporters for privately disclosing the vulnerabilities 
. This gave the security team time to fix the vulnerabilities before WordPress
sites could be attacked.

Props to Adam Zielinski , Pascal Birchler , Peter Wilson , Juliette Reinders
Folmer , Alex Concha , Ehtisham Siddiqui , Timothy Jacobs and the WordPress
security team for their work on these issues.

For more information, browse the full list of changes on Trac, or check out the
version 5.7.1 HelpHub documentation page .

Thanks and props!

The 5.7.1 release was led by @peterwilsoncc and @audrasjb .

In addition to the security researchers and release squad members mentioned
above, thank you to everyone who helped make WordPress 5.7.1 happen:

99w , Adam Silverstein , Andrew Ozz , annalamprou , anotherdave , Ari
Stathopoulos , Ayesh Karunaratne , bobbingwide , Brecht , Daniel Richards ,
David Baumwald , dkoo , Dominik Schilling , dragongate , eatsleepcode , Ella
van Durpe , Erik , Fabian Pimminger , Felix Arntz , Florian TIAR , gab81 , Gal
Baras , Geoffrey , George Mamadashvili , Glen Davies , Greg Ziolkowski , grzim 
, Ipstenu (Mika Epstein) , Jake Spurlock , Jayman Pandya , Jb Audras , Joen A. 
, Johan Jonk Stenstrom , Johannes Kinast , John Blackbourn , John James Jacoby 
, Jonathan Desrosiers , Josee Wouters , Joy , k3nsai , Kelly Choyce-Dwan ,
Kerry Liu , Marius L. J. , Mel Choyce-Dwan , Mikhail Kobzarev , mmuyskens ,
Mukesh Panchal , nicegamer7 , Otshelnik-Fm , Paal Joachim Romdahl , palmiak ,
Pascal Birchler , Peter Wilson , pwallner , Rachel Baker , Riad Benguella ,
Rinat Khaziev , Robert Anderson , Roger Theriault , Sergey Biryukov , Sergey
Yakimov , SirStuey , stefanjoebstl , Stephen Bernhardt , Sumit Singh , Sybre
Waaijer , Synchro , Terri Ann , tigertech , Timothy Jacobs , tmatsuur ,
TobiasBg , Tonya Mork , Toru Miki , Ulrich , and Vlad T .





 
ZMCIRT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. ZMCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Internet Email: report@cirt.zm     
Telephone:     7070 
                ZMCIRT personnel answer during Zambian business hours 
                which are 8am to 5pm.
                On call after hours for member emergencies only.
===========================================================================

Copyright @2023 ZAMBIA CIRT