Hash: SHA256

                         AUSCERT Security Bulletin

             WordPress 5.4.2 Security and Maintenance Release
                               12 June 2020


        AusCERT Security Bulletin Summary

Product:              Wordpress
Operating System:     Windows
                      UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Increased Privileges     -- Unknown/Unspecified         
                      Cross-site Scripting     -- Remote with User Interaction
                      Access Confidential Data -- Unknown/Unspecified         
Resolution:           Patch/Upgrade
Member content until: Sunday, July 12 2020


        A number of vulnerabilities have been identified in WordPress prior
        to version 5.4.2. [1]


        The vendor has provided the following information:
        "WordPress 5.4.2 is now available!
        This security and maintenance release features 22 fixes and enhancements. 
        Plus, it adds a number of security fixes-see the list below.
        These bugs affect WordPress versions 5.4.1 and earlier; version 5.4.2 fixes
        them, so you'll want to upgrade.
        If you haven't yet updated to 5.4, there are also updated versions of 5.3 and
        earlier that fix the bugs for you.
        Security Updates
        WordPress versions 5.4 and earlier are affected by the following bugs, which
        are fixed in version 5.4.2. If you haven't yet updated to 5.4, there are also
        updated versions of 5.3 and earlier that fix the security issues.
          o Props to Sam Thomas (jazzy2fives) for finding an XSS issue where
            authenticated users with low privileges are able to add JavaScript to posts
            in the block editor.
          o Props to Luigi - ( gubello.me ) for discovering an XSS issue where
            authenticated users with upload permissions are able to add JavaScript to
            media files.
          o Props to Ben Bidner of the WordPress Security Team for finding an open
            redirect issue in wp_validate_redirect() .
          o Props to Nrimo Ing Pandum for finding an authenticated XSS issue via theme
          o Props to Simon Scannell of RIPS Technologies for finding an issue where
            set-screen-option can be misused by plugins leading to privilege
          o Props to Carolina Nymark for discovering an issue where comments from
            password-protected posts and pages could be displayed under certain
        Thank you to all of the reporters for privately disclosing the vulnerabilities. 
        This gave the security team time to fix the vulnerabilities before WordPress
        sites could be attacked.
        One maintenance update was also deployed to versions 5.1, 5.2 and 5.3. See the
        related developer note for more information.
        You can browse the full list of changes on Trac .
        For more info, browse the full list of changes on Trac or check out the Version
        5.4.2 documentation page .
        WordPress 5.4.2 is a short-cycle maintenance release. The next major release
        will be version 5.5 .
        You can download WordPress 5.4.2 from the button at the top of this page, or
        visit your Dashboard -> Updates and click Update Now .
        If you have sites that support automatic background updates, they've already
        started the update process." [1]


        Wordpress recommends upgrading to the version 5.4.2 to fix these issues. [1]


        [1] WordPress 5.4.2 Security and Maintenance Release

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
Comment: http://www.auscert.org.au/render.html?it=1967