The other day a susceptability was uncovered: a particularly crafted LINK can be asked for that would certainly enable an assailant to bypass a protection check to validate an individual asked for a password reset. Because of this, the very first account without a type in the data source (normally the admin account) would certainly have its password reset and also a brand-new password would certainly be emailed to the account proprietor. This does not enable remote accessibility, however it is really irritating.
We repaired this issue last evening and also have actually been evaluating the repairs and also trying to find various other troubles ever since. Version 2.8.4 which fixes all known problems is now available for download and also is extremely suggested for all individuals of WordPress.