WordPress 4.8.2 was released today and is considered a security release. Site owners are strongly encouraged to update immediately.
Previous versions of WordPress (4.8.1 and earlier) are affected by the following security issues:
$wpdb->prepare()
can create unexpected and unsafe queries leading to potential SQL injection (SQLi). WordPress core is not directly vulnerable to this issue, but we’ve added hardening to prevent plugins and themes from accidentally causing a vulnerability. Reported by Slavco- A cross-site scripting (XSS) vulnerability was discovered in the oEmbed discovery. Reported by xknown of the WordPress Security Team.
- A cross-site scripting (XSS) vulnerability was discovered in the visual editor. Reported by Rodolfo Assis (@brutelogic) of Sucuri Security.
- A path traversal vulnerability was discovered in the file unzipping code. Reported by Alex Chapman (noxrnet).
- A cross-site scripting (XSS) vulnerability was discovered in the plugin editor. Reported by 陈瑞琦 (Chen Ruiqi).
- An open redirect was discovered on the user and term edit screens. Reported by Yasin Soliman (ysx).
- A path traversal vulnerability was discovered in the customizer. Reported by Weston Ruter of the WordPress Security Team.
- A cross-site scripting (XSS) vulnerability was discovered in template names. Reported by Luka (sikic).
- A cross-site scripting (XSS) vulnerability was discovered in the link modal. Reported by Anas Roubi (qasuar).
According to the WordPress core team, all issues were reported using responsible disclosure practices. The release also contains 6 maintenance fixes. See the full release notes here: https://codex.wordpress.org/Version_4.8.2
Automatic Updates
Many of the sites we managed were auto updated to 4.8.2 using the auto background update system introduced in WordPress 3.7. These background updates are configured to only update minor version releases such as this one. Not all sites were updated in this way however. If you haven’t updated yet, or are unsure we encourage you to log into your site and update immediately.
Unless you’re a Cinch customer – get back to work because you’re already updated :)