This is a different kind of WordPress tip, but a highly essential one. A little towards the end of last year, David Kierznowski discovered a minor security flaw, a flaw nonetheless in WordPress version 2.0.5. It is possible that all lower versions are affected as well.
However, there has been no public announcement of the vulnerability and a fix as well from the WordPress team, which is not only shocking but also extremely irresponsible on their part.
I do understand the reason of wanting to keep this all hush-hush would be to get out a release in time. But, something like this is bound to spill and it has. v2.0.6 is said to be not vulnerable, but that isn’t out yet!
Instead of getting a patch ready ASAP, the change has been made in the Trac system, which is beyond any non-programmer.
To get your installation patched open up
Goto Line 114 and replace the entire line with:
echo "<li><a href='templates.php?file=" . attribute_escape($recent) . "'>" . wp_specialchars(get_file_description(basename($recent))) . "</a></li>";
I’m not sure if this is the exact fix because I get a
Call to undefined function: attribute_escape() . I can’t edit any files out there. But, I believe I won’t be hacked 😉
Now to wait for 2.0.6 which I guess should be coming really soon.