You are here
Home > Latest Posts > News > Tech & Gadget News > WordPress 4.3.1 released: Full Changelog (List of Security issues & Bug fixes)

WordPress 4.3.1 released: Full Changelog (List of Security issues & Bug fixes)

Wordpress 4.3.1

Automattic has released WordPress 4.3.1 update for everyone. This is a security and maintenance release for all previous versions and brings fixes to many security issues and bugs including one that causes severe server load.

WordPress 4.3.1 changelog:

This release addresses three issues, including two cross-site scripting vulnerabilities and a potential privilege escalation.

  • WordPress versions 4.3 and earlier are vulnerable to a cross-site scripting vulnerability when processing shortcode tags (CVE-2015-5714). Reported by Shahar Tal and Netanel Rubin of Check Point.
  • A separate cross-site scripting vulnerability was found in the user list table. Reported by Ben Bidner of the WordPress security team.
  • Finally, in certain cases, users without proper permissions could publish private posts and make them sticky (CVE-2015-5715). Reported by Shahar Tal and Netanel Rubin of Check Point.

Our thanks to those who have practiced responsible disclosure of security issues.

WordPress 4.3.1 also fixes twenty-six bugs. For more information, see the release notes or consult the list of changes.

How to update:

Download WordPress 4.3.1 or venture over to Dashboard → Updates and simply click “Update Now.” Sites that support automatic background updates are already beginning to update to WordPress 4.3.1.

Source

Nayan
Nayan has more than 10 years of experience of covering Technology and innovations. He is a big Nokia fan and Tech disruptions aficionado. He loves to review new cool gadgets and writing about Android, iOS, Gadgets and general Technology stuff. He has been associated with other well-known Tech sites WinCentral and Nokiapoweruser since long. He currently sports a Lumia 950 XL and Nexus 5X. Other interests include listening to Nu-Metal Hits and Kick-Boxing. Write to him at Email: [email protected]
Top