WordPress 5.4.2 is now available and it fixes a number of security issues.

Anyone on SequelWP has been automatically patched and our WAF now actively blocks these attacks!

Majority of the vulnerabilities came in the form of XSS attacks (Cross Site Scripting) and were quite limited in their scope of vulnerability.

Here’s an outline from WordPress on what was patched in this latest update:

Props to Sam Thomas (jazzy2fives) for finding an XSS issue where authenticated users with low privileges are able to add JavaScript to posts in the block editor.

Props to Luigi – (gubello.me) for discovering an XSS issue where authenticated users with upload permissions are able to add JavaScript to media files.

Props to Ben Bidner of the WordPress Security Team for finding an≈open redirect issue in wp_validate_redirect().

Props to Nrimo Ing Pandum for finding an authenticated XSS issue via theme uploads.

Props to Simon Scannell of RIPS Technologies for finding an issue where set-screen-option can be misused by plugins leading to privilege escalation.

Props to Carolina Nymark for discovering an issue where comments from password-protected posts and pages could be displayed under certain conditions.

If you have any questions or concerns please reach out to our support team and we’d be happy to assist.