-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.2965
                     WordPress 6.2.2 Security Release
                                22 May 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           WordPress
Publisher:         WordPress
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://wordpress.org/news/2023/05/wordpress-6-2-2-security-release/

Comment: CVSS (Max):  None available when published

- --------------------------BEGIN INCLUDED TEXT--------------------

WordPress 6.2.2 Security Release

WordPress 6.2.2 is now available!

The 6.2.2 minor release addresses 1 bug and 1 security issue. Because this is a
security release, it is recommended that you update your sites immediately. All
versions since WordPress 5.9 have also been updated.

WordPress 6.2.2 is a rapid response release to address a regression in 6.2.1
and further patch a vulnerability addressed in 6.2.1. The next major release
will be version 6.3 planned for August 2023.

The update process will begin automatically if you have sites that support
automatic background updates.

You can download WordPress 6.2.2 from WordPress.org or visit your WordPress
Dashboard, click "Updates," and click "Update Now."

For more information on this release, please visit the HelpHub site .

Security updates included in this release

The security team would like to thank the following people for responsibly
reporting vulnerabilities and allowing them to be fixed in this release.

  o Block themes parsing shortcodes in user-generated data; thanks to Liam
    Gladdy of WP Engine for reporting this issue.

The issue above was originally patched in the 6.2.1 release, but needed further
hardening here in 6.2.2. The Core team is thankful for the community in their
response to 6.2.1 and collaboration on finding the best path forward for proper
resolution in 6.2.2. The folks who worked on 6.2.2 are especially appreciative
for everyone's understanding while they worked asynchronously to get this out
the door as quickly as possible.

Thank you to these WordPress contributors

This release was led by Jonathan Desrosiers .

WordPress 6.2.2 would not have been possible without the contributions of the
following people. Their asynchronous coordination to deliver security fixes
into a stable release is a testament to the power and capability of the
WordPress community.

Aaron Jorbin , Alex Concha , Anthony Burchell , Chloe Bringmann , chriscct7 ,
Daniel Richards , David Baumwald , Ehtisham S. , Greg Ziolkowski , Isabel
Brison , Jb Audras , Jeffrey Paul , John Blackbourn , Jonathan Desrosiers ,
Josepha , Marius L. J. , Matias Ventura , Mike Schroder , Peter Wilson , Riad
Benguella , Robert Anderson , Ryan McCue , Samuel Wood (Otto) , Scott Reilly ,
and Timothy Jacobs

How to contribute

To get involved in WordPress core development, head over to Trac, pick a ticket
, and join the conversation in the #core and #6-3-release-leads channels. Need
help Check out the Core Contributor Handbook .

Thanks to @ cbringmann , @ davidbaumwald , @ chanthaboune , @ jeffpaul for
proofreading.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=UYrN
-----END PGP SIGNATURE-----