{"id":6736,"date":"2019-03-12T03:34:22","date_gmt":"2019-03-12T03:34:22","guid":{"rendered":"https:\/\/wordpress.org\/news\/?p=6736"},"modified":"2022-11-18T22:53:12","modified_gmt":"2022-11-18T22:53:12","slug":"wordpress-5-1-1-security-and-maintenance-release","status":"publish","type":"post","link":"https:\/\/wordpress.org\/news\/2019\/03\/wordpress-5-1-1-security-and-maintenance-release\/","title":{"rendered":"WordPress 5.1.1 Security and Maintenance Release"},"content":{"rendered":"\n

WordPress 5.1.1 is now available! This security and maintenance release introduces 14 fixes and enhancements, including changes designed to help hosts prepare users for the minimum PHP version bump coming in 5.2<\/a>.<\/p>\n\n\n\n

This release also includes a pair of security fixes that handle how comments are filtered and then stored in the database. With a maliciously crafted comment, a WordPress post was vulnerable to cross-site scripting.<\/p>\n\n\n\n

WordPress versions 5.1 and earlier are affected by these bugs, which are fixed in version 5.1.1. Updated versions of WordPress 5.0 and earlier are also available for any users who have not yet updated to 5.1.<\/p>\n\n\n\n

Props to Simon Scannell of RIPS Technologies who discovered this flaw independent of some work that was being done by members of the core security team. Thank you to all of the reporters for privately disclosing the vulnerabilities<\/a>, which gave us time to fix them before WordPress sites could be attacked.<\/p>\n\n\n\n

Other highlights of this release include:<\/p>\n\n\n\n