![]() ![]() A Remote Code Execution vulnerability that is not directly exploitable in core however, the security team feels that there is a potential for high severity when combined with some plugins, especially in multisite installations.The security team addressed the following vulnerability in WordPress 6.4.2 ![]() #59891 – Incorrect example for WP_HTML_Tag_Processor class.#59882 – Expose serialized template content to callbacks registered to the `hooked_block_types` filter.#59869 – Incorrect reference in docblock for _register_theme_block_patterns.#59847 – Since WordPress 6.4, the functions.php of a theme moved to a different location using register_theme_directory is no longer called.#59821 – Irrelevant comment for translators.#59819 – Change CSS align-item from start / end to flex-start / flex-end for full browser support.First Steps With WordPress or Upgrading WordPress Extended.If you are new to WordPress, we recommend that you begin with the following: įor step-by-step instructions on installing and updating WordPress: To get this version, update automatically from the Dashboard > Updates menu in your site’s admin area or visit. On December 6, 2023, WordPress 6.4.2 was released to the public. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |