WordPress Security Update 6.0.3 Patches 16 Vulnerabilities

WordPress Security Update 6.0.3

WordPress Security Update 6.0.3

WordPress 6.0.3 fixes nine stored and reflected cross-site scripting (XSS) vulnerabilities, as well as open redirect, data exposure, cross-site request forgery (CSRF), and SQL injection flaws.

WordPress security company Defiant has shared a description of each vulnerability. Four of them have a ‘high severity’ rating, and the rest have ‘medium’ or ‘low’ severity.

“We have determined that these vulnerabilities are unlikely to be seen as mass exploits but several of them could offer a way for skilled attackers to exploit high-value sites using targeted attacks,” the company warned.

How to Become a WordPress Developer? 5 Skills You Need to Master to Become One

One of the high-severity vulnerabilities is a stored XSS issue that can be exploited by a user who can submit posts to a website via email to inject malicious JavaScript code into posts. The code would get executed when the malicious post is accessed.

Another high-severity flaw is a reflected XSS that can be exploited for arbitrary code execution by an unauthenticated attacker via a specially crafted search query in the media library. Exploitation requires user interaction and creating a payload is not easy, but Defiant believes this could be the most exploitable vulnerability in this release due to the attacker not needing to be authenticated.

The third high-severity issue is a SQL injection that could be exploited by a third-party plugin or theme — the WordPress core itself is not affected.

The last severe issue is a CSRF bug that can be leveraged by an unauthenticated attacker to trigger a trackback on behalf of a legitimate user, but social engineering is required for successful exploitation.

WordPress websites that support automatic background updates will be patched automatically. The next major release is version 6.1, planned for November 1.

WordPress Security Update 6.0.3


Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts