{"id":490,"date":"2014-11-21T11:13:15","date_gmt":"2014-11-21T03:13:15","guid":{"rendered":"http:\/\/lesterchan.net\/wordpress\/?p=490"},"modified":"2015-04-24T10:54:49","modified_gmt":"2015-04-24T02:54:49","slug":"wordpress-4-0-1-released","status":"publish","type":"post","link":"https:\/\/lesterchan.net\/wordpress\/2014\/11\/21\/wordpress-4-0-1-released\/","title":{"rendered":"WordPress 4.0.1 Released"},"content":{"rendered":"<p><a href=\"https:\/\/wordpress.org\/news\/2014\/11\/wordpress-4-0-1\/\">WordPress 4.0.1<\/a> has been released today and it is a important security release. So please update your WordPress site as soon as possible.<\/p>\n<blockquote>\n<p>WordPress 4.0.1 is now available. This is a <strong>critical security release<\/strong> for all previous versions and we strongly encourage you to update your sites immediately.<\/p>\n<p>Sites that support automatic background updates will be updated to WordPress 4.0.1 within the next few hours. If you are still on WordPress 3.9.2, 3.8.4, or 3.7.4, you will be updated to 3.9.3, 3.8.5, or 3.7.5 to keep everything secure. (We don\u2019t support older versions, so please update to 4.0.1 for the latest and greatest.)<\/p>\n<p>WordPress versions 3.9.2 and earlier are affected by a critical cross-site scripting vulnerability, which could enable anonymous users to compromise a site. This was reported by <a href=\"http:\/\/klikki.fi\/\">Jouko Pynnonen<\/a>. This issue does not affect version 4.0, but version 4.0.1 does address these eight security issues:<\/p>\n<ul>\n<li>Three cross-site scripting issues&nbsp;that a contributor or author could&nbsp;use to compromise a site. Discovered by <a href=\"http:\/\/joncave.co.uk\/\">Jon Cave<\/a>, <a href=\"http:\/\/www.miqrogroove.com\/\">Robert Chapin<\/a>, and <a href=\"https:\/\/johnblackbourn.com\/\">John Blackbourn<\/a> of the WordPress security team.<\/li>\n<li>A cross-site request forgery that could be used to trick a user into&nbsp;changing their password.<\/li>\n<li>An issue that could lead to a denial of service when passwords are checked. Reported by <a href=\"http:\/\/www.behindthefirewalls.com\/\">Javier Nieto Arevalo<\/a> and <a href=\"http:\/\/www.devconsole.info\/\">Andres Rojas Guerrero<\/a>.<\/li>\n<li>Additional protections for server-side request forgery attacks when WordPress makes HTTP requests. Reported by Ben Bidner (vortfu).<\/li>\n<li>An extremely unlikely hash collision could allow a user\u2019s account to be compromised, that also required that they haven\u2019t logged in since 2008 (I wish I were kidding). Reported by <a href=\"http:\/\/david.dw-perspective.org.uk\">David Anderson<\/a>.<\/li>\n<li>WordPress now invalidates the links in a password reset email if the user remembers their password, logs in, and changes their email address. Reported separately by <a href=\"https:\/\/twitter.com\/MomenBassel\">Momen Bassel<\/a>, <a href=\"http:\/\/c0dehouse.blogspot.in\/\">Tanoy Bose<\/a>, and&nbsp;<a href=\"https:\/\/managewp.com\/\">Bojan Slavkovi? of ManageWP<\/a>.<\/li>\n<\/ul>\n<p>Version 4.0.1 also fixes 23 bugs with 4.0, and we\u2019ve&nbsp;made two hardening changes, including better validation of EXIF data we are extracting from uploaded photos. Reported by <a href=\"http:\/\/www.securesolutions.no\/\">Chris Andr\u00e8 Dale<\/a>.<\/p>\n<\/blockquote>\n<p>Download: <a href=\"https:\/\/wordpress.org\/latest.zip\">WordPress 4.0.1<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WordPress 4.0.1 has been released today and it is a important security release. So please update your WordPress site as soon as possible. WordPress 4.0.1 is now available. This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately. Sites that support automatic background updates will &hellip; <a href=\"https:\/\/lesterchan.net\/wordpress\/2014\/11\/21\/wordpress-4-0-1-released\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;WordPress 4.0.1 Released&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[148,28],"class_list":["post-490","post","type-post","status-publish","format-standard","hentry","category-site","tag-4-0","tag-release"],"views":8561,"_links":{"self":[{"href":"https:\/\/lesterchan.net\/wordpress\/wp-json\/wp\/v2\/posts\/490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lesterchan.net\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lesterchan.net\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lesterchan.net\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lesterchan.net\/wordpress\/wp-json\/wp\/v2\/comments?post=490"}],"version-history":[{"count":0,"href":"https:\/\/lesterchan.net\/wordpress\/wp-json\/wp\/v2\/posts\/490\/revisions"}],"wp:attachment":[{"href":"https:\/\/lesterchan.net\/wordpress\/wp-json\/wp\/v2\/media?parent=490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lesterchan.net\/wordpress\/wp-json\/wp\/v2\/categories?post=490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lesterchan.net\/wordpress\/wp-json\/wp\/v2\/tags?post=490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}