Most expected WordPress 4.7.3 is now available for update. This security update covers six security issues that exists with WordPress version 4.7.2.
- Cross-site scripting (XSS) via media file metadata. Reported by Chris Andrè Dale, Yorick Koster, and Simon P. Briggs.
- Control characters can trick redirect URL validation. Reported by Daniel Chatfield.
- Unintended files can be deleted by administrators using the plugin deletion functionality. Reported by xuliang.
- Cross-site scripting (XSS) via video URL in YouTube embeds. Reported by Marc Montpas.
- Cross-site scripting (XSS) via taxonomy term names. Reported by Delta.
- Cross-site request forgery (CSRF) in Press This leading to excessive use server resources. Reported by Sipke Mellema.
As indicated by Koster, who recognized the vulnerabilities in the playlist functionality, the attacker needs to persuade a editor or administrator into transferring a MP3 file containing exceptionally made metadata.
Utilizing this trap the attacker’s code will be executed when the metadata is prepared by the renderTracks() or wp_playlist_shortcode() capacities.
In any case, there is a CSRF vulnerability in WordPress that still has not been fixed, the flaw was found in July 2016 and the details for the exploitation were not disclosed.
How to update
WordPress 4.7.3 contains 39 maintenance fixes to the 4.7 release series. Updates are simple Dashboard >> Updates >> Update Now.
Sites that bolster automatic background updates are now refreshing to WordPress 4.7.3.
It is always a good idea to backup your WordPress before proceeding with update, if there is any issues,you can restore your website.
WordPress-4.7.3 MD5 : 79c278099df49ad089e659c89533d9c0 Wordpress-4.7.3 SHA-1 : 26d362ed9a41522b1e32f1c6b87ae2f16737cdd6