Table of Contents
Recently, new vulnerabilities affecting WordPress have been identified.
All customers who use WordPress are advised to upgrade to the latest version (3.5.2) immediately. You can view our full walk-through guide on Updating WordPress here in our Support Center.
Below is a list and explanation of the vulnerabilities:
- CVE-2013-2173
A denial of service was found in the way wordpress performs hash computation when checking password for protected posts. An attacker supplying carefully crafted input as a password could make the platform use excessive CPU usage - CVE-2013-2199
Multiple server-side requests forgery (SSRF) vulnerabilities were found in the HTTP API. This is related to CVE-2013-0235, which was specific to SSRF in pingback requests and was fixed in 3.5.1 - CVE-2013-2201
Multiple cross-side scripting (XSS) vulnerabilities due to badly escaped input were found in the media files and plugins upload forms - CVE-2013-2202
XML External Entity Injection (XXE) vulnerability via oEmbed responses - CVE-2013-2203
A Full path disclosure (FPD) was found in the file upload mechanism. If the upload directory is not writable, the error message returned includes the full directory path - CVE-2013-2203
A Full path disclosure (FPD) was found in the file upload mechanism. If the upload directory is not writable, the error message returned includes the full directory path - CVE-2013-2204
Content spoofing via flash applet in the embedded tinyMCE media plugin - CVE-2013-2205
Cross-domain XSS in the embedded SWFupload uploader
You can read the Official WordPress Release notes regarding this latest update on WordPress.org.