
===================================================================                               CERT-Renater

                    Note d'Information No. 2022/VULN388

_____________________________________________________________________

DATE                : 18/10/2022

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running WordPress versions prior to
                                      6.0.3.

====================================================================https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/
_____________________________________________________________________

October 17, 2022
By Jb Audras in Releases, Security
WordPress 6.0.3 Security Release


WordPress 6.0.3 is now available!

This release features several security fixes. Because this is a
security release, it is recommended that you update your sites
immediately. All versions since WordPress 3.7 have also been
updated.


WordPress 6.0.3 is a short-cycle release. The next major release
will be version 6.1 planned for November 1, 2022.

If you have sites that support automatic background updates, the
update process will begin automatically.

You can download WordPress 6.0.3 from WordPress.org, or visit
your WordPress Dashboard, click “Updates”, and then click
“Update Now”.

For more information on this release, please visit the HelpHub site.


Security updates included in this release

The security team would like to thank the following people for
responsibly reporting vulnerabilities, and allowing them to be
fixed in this release.


Stored XSS via wp-mail.php (post by email) – Toshitsugu Yoneyama
of Mitsui Bussan Secure Directions, Inc. via JPCERT

Open redirect in `wp_nonce_ays` – devrayn

Sender’s email address is exposed in wp-mail.php – Toshitsugu
Yoneyama of Mitsui Bussan Secure Directions, Inc. via JPCERT

Media Library – Reflected XSS via SQLi – Ben Bidner from the
WordPress security team and Marc Montpas from Automattic
independently discovered this issue

CSRF in wp-trackback.php – Simon Scannell

Stored XSS via the Customizer – Alex Concha from the WordPress
security team

Revert shared user instances introduced in 50790 – Alex Concha
and Ben Bidner from the WordPress security team

Stored XSS in WordPress Core via Comment Editing – Third-party
security audit and Alex Concha from the WordPress security team

Data exposure via the REST Terms/Tags Endpoint – Than Taintor

Content from multipart emails leaked – Thomas Kräftner

SQL Injection due to improper sanitization in `WP_Date_Query`
– Michael Mazzolini

RSS Widget: Stored XSS issue – Third-party security audit

Stored XSS in the search block – Alex Concha of the WP Security
team

Feature Image Block: XSS issue – Third-party security audit

RSS Block: Stored XSS issue – Third-party security audit

Fix widget block XSS – Third-party security audit



Thank you to these WordPress contributors
This release was led by Alex Concha, Peter Wilson, Jb Audras,
and Sergey Biryukov at mission control.

Thanks to Jonathan Desrosiers, Jorge Costa, Bernie Reiter and
Carlos Bravo for their help on package updates.

WordPress 6.0.3 would not have been possible without the
contributions of the following people. Their asynchronous
coordination to deliver several fixes into a stable release is
a testament to the power and capability of the WordPress
community.


Alex Concha, Colin Stewart, Daniel Richards, David Baumwald,
Dion Hulse, ehtis, Garth Mortensen, Jb Audras, John Blackbourn,
John James Jacoby, Jonathan Desrosiers, Jorge Costa,
Juliette Reinders Folmer, Linkon Miyan, martin.krcho, Matias Ventura,
Mukesh Panchal, Paul Kevan, Peter Wilson, Robert AndersonRobin,
Sergey Biryukov, Sumit Bagthariya, Teddy Patriarca, Timothy Jacobs,
vortfu, and Česlav Przywara.


Thanks to @peterwilsoncc for proofreading.


========================================================+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=======================================================
