ClassicPress 1.4.4
29 October 2022
ClassicPress version 1.4.4 is now available (security release).
Upgrading to ClassicPress 1.4.4
ClassicPress 1.4.4 can be upgraded to (or installed) using any of Installatron's products. Use Installatron's optional Automatic Update feature to automatically apply ClassicPress updates as new versions are released, or use Installatron's Clone feature to duplicate an existing ClassicPress install to test the 1.4.4 upgrade prior to applying it live. Get started managing your ClassicPress installations with Installatron
What's New in ClassicPress 1.4.4
Security
- Stored XSS via wp-mail.php (post by email) – Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. via JPCERT
- Open redirect in wp_nonce_ays – devrayn
- Sender’s email address is exposed in wp-mail.php – Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. via JPCERT
- Media Library – Reflected XSS via SQLi – Ben Bidner from the WordPress security team and Marc Montpas from Automattic independently discovered this issue
- CSRF in wp-trackback.php – Simon Scannell
- Stored XSS via the Customizer – Alex Concha from the WordPress security team
- Revert shared user instances introduced in 50790 – Alex Concha and Ben Bidner from the WordPress security team
- Stored XSS in WordPress Core via Comment Editing – Third-party security audit and Alex Concha from the WordPress security team
- Data exposure via the REST Terms/Tags Endpoint – Than Taintor
- Content from multipart emails leaked – Thomas Kräftner
- RSS Widget: Stored XSS issue – Third-party security audit