The other day a susceptability was found: a particularly crafted LINK can be asked for that would certainly permit an assailant to bypass a safety check to confirm an individual asked for a password reset. Consequently, the very first account without a type in the data source (typically the admin account) would certainly have its password reset as well as a brand-new password would certainly be emailed to the account proprietor. This does not permit remote gain access to, yet it is extremely irritating.
We repaired this trouble last evening as well as have actually been checking the solutions as well as trying to find various other troubles ever since. Version 2.8.4 which fixes all known problems is now available for download as well as is extremely advised for all customers of WordPress.