WordPress has brought in new updates to the WordPress version 3.1.3 to fix the vulnerability in the handling of media files.
Microsoft team was the first team to spot out the vulnerability in handling of media files; the experts had done a Vulnerability Research as per the company’s assessment to move its own LiveSpaces bloggers to the WordPress platform, reports showed up that the patches has got a potential concern with the file upload security when WordPress is installed on badly-configured hosts, and leaving the information exposed will bring in vulnerability related to canonical redirects was spotted by Verónica Valeros.
Latest update also features multiple implantations to the general security of the whole platform; this will make it harder for the taxonomy queries and solution fix for the cancelled imports that would previously leave half-finished import files hanging around in the host’s file system.
Looking at a user facing perspective, this new update gives in clickjacking shield for all the required admin and login pages, and this makes it difficult for the malware to steal login credentials by falsifying the WordPress user interface.
However there haven’t been any attacks so far, but being most popular blogging platform in the world, WordPress attracts and invites ore than its fair share of ne’er-do-wells looking to exploit the slightest hole in the software.