FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

wordpress -- 2 cross-site scripting vulnerabilities

Affected packages
wordpress < 4.2.2,1
de-wordpress < 4.2.2
ja-wordpress < 4.2.2
ru-wordpress < 4.2.2
zh-wordpress-zh_CN < 4.2.2
zh-wordpress-zh_TW < 4.2.2

Details

VuXML ID d86890da-f498-11e4-99aa-bcaec565249c
Discovery 2015-05-07
Entry 2015-05-07
Modified 2015-09-15

Samuel Sidler reports:

The Genericons icon font package, which is used in a number of popular themes and plugins, contained an HTML file vulnerable to a cross-site scripting attack. All affected themes and plugins hosted on WordPress.org (including the Twenty Fifteen default theme) have been updated today by the WordPress security team to address this issue by removing this nonessential file. To help protect other Genericons usage, WordPress 4.2.2 proactively scans the wp-content directory for this HTML file and removes it. Reported by Robert Abela of Netsparker.

WordPress versions 4.2 and earlier are affected by a critical cross-site scripting vulnerability, which could enable anonymous users to compromise a site. WordPress 4.2.2 includes a comprehensive fix for this issue.

The release also includes hardening for a potential cross-site scripting vulnerability when using the visual editor. This issue was reported by Mahadev Subedi.

References

URL https://wordpress.org/news/2015/05/wordpress-4-2-2/