WordPress is urging webmasters to update their CMS packages as quickly as possible to protect their domains from critical vulnerability exploits.
On Thursday, the content management system (CMS) provider released a security advisory alongside the latest version of WordPress, 4.6.1. Now available, the update patches two serious security problems, a cross-site scripting vulnerability and a path traversal security flaw.
An attacker can exploit this vulnerability to perform a range of actions, including stealing session tokens and login credentials, as well as remotely execute malicious code.
The second critical issue, reported by Dominik Schilling from the WordPress security team, is a path traversal vulnerability discovered within the upgrade package uploader.
WordPress has patched these problems in version 4.6.1, but all earlier versions of the CMS are vulnerable to exploit. The CMS provider also fixed a further 15 bugs from WordPress 4.6, including email server setup issues, peculiar thumbnail behaviors and plugin install infinite loop errors.
Back in June, security researchers warned that over 10,000 WordPress websites were at risk of attack due to the discovery of a zero-day vulnerability within the WP Mobile Detector plugin.[related-posts]