The other day a susceptability was found: a particularly crafted link might be asked for that would certainly enable an aggressor to bypass a protection check to confirm an individual asked for a password reset. Therefore, the initial account without a type in the data source (typically the admin account) would certainly have its password reset as well as a brand-new password would certainly be emailed to the account proprietor. This does not enable remote accessibility, yet it is really bothersome.
We repaired this trouble last evening as well as have actually been evaluating the solutions as well as searching for various other troubles ever since. Version 2.8.4 which fixes all known problems is now available for download as well as is very advised for all customers of WordPress.