Description

Two vulnerabilities have been reported in WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service).

1) Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

2) The “make_clickable()” function in wp-includes/formatting.php does not properly check the URL length in comments before passing it to the PCRE library, which can be exploited to cause a crash.

The vulnerabilities are reported in versions prior to 3.1.1.

Solution
Update to version 3.1.1.

Provided and/or discovered by
The vendor credits Jon Cave and Peter Westwood.

Original Advisory
WordPress:

WordPress 3.1.1

Source :
http://secunia.com/advisories/44038/

Related Article:
How to Upgrade WordPress