WordPress 5.8.1 is currently available for download, and it is fighting website vulnerabilities.

Detection and resolution of three rare WordPress security vulnerabilities

Several security and maintenance vulnerabilities have been addressed in a new WordPress security and maintenance update that affects versions 5.4 through 5.8 of the platform.

Data exposure vulnerabilities in the REST API, cross-site scripting vulnerabilities in the Gutenberg block editor, and several severe vulnerabilities in the Lodash JavaScript Library are among the concerns that have been addressed.

WordPress 5.8.1 is now live and available to the public, and all versions of the software from version 5.4 have been upgraded to address the vulnerabilities described above.

WordPress has received yet another update.
As a whole, WordPress 5.8.1 release candidate one contains 41 bug fixes for the core of the software as well as 20 bug fixes for the Block Editor.

WordPress staff members Jonathan Desrosiers and Evan Mullins were in charge of the release, and they expressed their gratitude to everyone who reported vulnerabilities during the WordPress 5.8 beta testing phase in a blog post. These notifications provided enough time for the company’s security staff to address the problems before any WordPress sites were compromised.

Security problems are discussed in detail.
When an application programming interface (API or web API) adheres to the restrictions of the REST architectural style and permits interaction with RESTful web services, it is referred to as a REST API.

When a web application is vulnerable to cross-site scripting (XSS), an attacker has the potential to compromise the interactions that users have with the vulnerable application.

It was necessary to upgrade the Lodash library in each branch to version 4.17.21 in order to integrate upstream security patches.

These security vulnerabilities that were addressed as part of the WordPress update are significant since they go outside the scope of the regular maintenance upgrades that are performed.

 

 

Spread the love

Leave a Reply

Your email address will not be published. Required fields are marked *