A security release for all previous versions of WordPress is now available, and the company highly recommends all users upgrade immediately.
The previous version of WordPress, 4.7, has been downloaded over 10 million times since its release last month. However, it came with some flaws.
Specifically, the release addresses eight security issues affecting WordPress versions 4.7 and earlier:
– Remote code execution (RCE) in PHPMailer
– The REST API exposed user data for all users who had authored a post of a public post type. WordPress 4.7.1 limits this to only post types which have specified that they should be shown within the REST API.
– Cross-site scripting (XSS) via the plugin name or version header on update-core.php.
– Cross-site request forgery (CSRF) bypass via uploading a Flash file.
– Cross-site scripting (XSS) via theme name fallback.
– Post via email checks mail.example.com if default settings aren’t changed.
– A cross-site request forgery (CSRF) was discovered in the accessibility mode of widget editing.
– Weak cryptographic security for multisite activation key.
WordPress relies heavily on its community for updating and improving its content management system, and this update was no exception. All of the above issues were reported by WordPress users in an effort to maintain the CMS’s safety and security.
In addition to the security issues listed above, WordPress 4.7.1 fixes 62 bugs from version 4.7. You can download Version 4.7.1 directly from your WordPress dashboard, or you may have it already if you’ve signed up for automatic updates.