WordPress 6.0.3 started rolling out this week. The latest security release patches 16 vulnerabilities.
WordPress 6.0.3 fixes nine stored and reflected cross-site scripting (XSS) vulnerabilities, as well as open redirect, data exposure, cross-site request forgery (CSRF), and SQL injection flaws.
WordPress security company Defiant has shared a description of each vulnerability. Four of them have a ‘high severity’ rating, and the rest have ‘medium’ or ‘low’ severity.
“We have determined that these vulnerabilities are unlikely to be seen as mass exploits but several of them could offer a way for skilled attackers to exploit high-value sites using targeted attacks,” the company warned.
One of the high-severity vulnerabilities is a stored XSS issue that can be exploited by a user who can submit posts to a website via email to inject malicious JavaScript code into posts. The code would get executed when the malicious post is accessed.
Another high-severity flaw is a reflected XSS that can be exploited for arbitrary code execution by an unauthenticated attacker via a specially crafted search query in the media library. Exploitation requires user interaction and creating a payload is not easy, but Defiant believes this could be the most exploitable vulnerability in this release due to the attacker not needing to be authenticated.
The third high-severity issue is a SQL injection that could be exploited by a third-party plugin or theme — the WordPress core itself is not affected.
The last severe issue is a CSRF bug that can be leveraged by an unauthenticated attacker to trigger a trackback on behalf of a legitimate user, but social engineering is required for successful exploitation.
WordPress websites that support automatic background updates will be patched automatically. The next major release is version 6.1, planned for November 1.
According to Sucuri’s Website Threat Research Report for 2021, WordPress websites accounted for more than 95% of CMS infections, and roughly one-third of the sites on which the cybersecurity firm detected a credit card skimmer were running WordPress.
Related: Fake DDoS Protection Prompts on Hacked WordPress Sites Deliver RATs
Related: Unpatched WPBakery WordPress Plugin Vulnerability Increasingly Targeted in Attacks
Related: WordPress Sites Hacked via Zero-Day Vulnerability in WPGateway Plugin
Related: Exploited Vulnerability Patched in WordPress Plugin With Over 1 Million Installations

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
- New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
- Forward Networks Raises $50 Million in Series D Funding
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
