Several vulnerabilities were discovered in Wordpress, a web blogging tool. The Common Vulnerabilities and Exposures project identifies the following problems:
SQL Injection allowed a remote attacker to compromise the site.
The robustness of the shortcodes HTML tags filter has been improved. The parsing is a bit more strict, which may affect your installation.
A cross-site scripting vulnerability when processing shortcode tags.
A vulnerability has been discovered, allowing users without proper permissions to publish private posts and make them sticky.
An attacker could lock a post that was being edited.
Cross-site scripting in a widget title allows an attacker to steal sensitive information.
Fix some broken links in the legacy theme preview.
A cross-site scripting vulnerability in user list tables.
For the oldstable distribution (wheezy), these problems have been fixed in version 3.6.1+dfsg-1~deb7u8.
For the stable distribution (jessie), these problems have been fixed in version 4.1+dfsg-1+deb8u5 or earlier in DSA-3332-1 and DSA-3375-1.
For the testing distribution (stretch), these problems have been fixed in version 4.3.1+dfsg-1 or earlier versions.
For the unstable distribution (sid), these problems have been fixed in version 4.3.1+dfsg-1 or earlier versions.
We recommend that you upgrade your wordpress packages.