• Skip to main content
  • Skip to footer

7th Circle Designs

Building, Securing, and Optimizing WordPress Since 2014

  • Training and Coaching
    • Online WordPress Training and Coaching
    • Virtual Meeting
    • eLearning
  • Services
    • WordPress Security Audit
    • WordPress Site Design
      • WordPress Site
      • WordPress Membership Site
      • WordPress eCommerce Site
      • CPA Web Package
    • WordPress Care Plans
    • Search Engine Optimization and Branding
      • Personal Branding Package
      • Business Branding Package
      • Search Engine Optimization
    • Information Technology
  • Plugins
    • E-mail
    • Easy Digital Downloads
    • Genesis
    • Modern Tribe Events
    • Optimization and Tweaking
    • Personalization and Branding
    • Security
    • SEO
    • WooCommerce
  • Blog
  • Contact Us
  • Login
  • Cart

WordPress 4.7.1 Security and Maintenance Release

January 14, 2017 by 7th Circle Designs Leave a Comment

This is a security release for all previous versions and we strongly encourage you to update your sites immediately.

WordPress versions 4.7 and earlier are affected by eight security issues:

  1. Remote code execution (RCE) in PHPMailer – No specific issue appears to affect WordPress or any of the major plugins we investigated but, out of an abundance of caution, we updated PHPMailer in this release. This issue was fixed in PHPMailer thanks to Dawid Golunski and Paul Buonopane.
  2. The REST API exposed user data for all users who had authored a post of a public post type. WordPress 4.7.1 limits this to only post types which have specified that they should be shown within the REST API. Reported by Krogsgard and Chris Jean.
  3. Cross-site scripting (XSS) via the plugin name or version header on update-core.php. Reported by Dominik Schilling of the WordPress Security Team.
  4. Cross-site request forgery (CSRF) bypass via uploading a Flash file. Reported by Abdullah Hussam.
  5. Cross-site scripting (XSS) via theme name fallback. Reported by Mehmet Ince.
  6. Post via email checks mail.example.com if default settings aren’t changed. Reported by John Blackbourn of the WordPress Security Team.
  7. A cross-site request forgery (CSRF) was discovered in the accessibility mode of widget editing. Reported by Ronnie Skansing.
  8. Weak cryptographic security for multisite activation key. Reported by Jack.

Thank you to the reporters for practicing responsible disclosure.

In addition to the security issues above, WordPress 4.7.1 fixes 62 bugs from 4.7. For more information, see the release notes or consult the list of changes.

Download WordPress 4.7.1 or venture over to Dashboard → Updates and simply click “Update Now.” Sites that support automatic background updates are already beginning to update to WordPress 4.7.1.

Filed Under: WordPress Maintenance Release, WordPress Security Release

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Footer

Recent Posts

  • WooCommerce 6.8 Released
  • WooCommerce 6.7 Released
  • WordPress 6.0.1 Maintenance Release
  • WooCommerce 6.6.1 Fix Release
  • WooCommerce 6.6 Released

Categories

Sign up for our newsletter

This field is for validation purposes and should be left unchanged.

  • Facebook
  • Twitter
  • LinkedIn
  • Yelp
  • Sitemap
  • Terms of Service
  • Privacy Policy
  • Accessibility Statement
  • Affiliate Disclosure
  • Pay An Invoice

Buy Me A Coffee

Copyright © 2009–2022 7th Circle Designs · All Rights Reserved
Built and designed by 7th Circle Designs