From ${URL} : Three issues fixed in WordPress 3.6.1: http://codex.wordpress.org/Version_3.6.1 * Unsafe PHP unserialization. CWE-502. http://core.trac.wordpress.org/changeset/25325. * Open Redirect / Insufficient Input Validation. CWE-601. http://core.trac.wordpress.org/changeset/25323 and http://core.trac.wordpress.org/changeset/25324. * Privilege Escalation: a user with an Author role, using a specially crafted request, was able to create a post that was marked as "written by" another user. http://core.trac.wordpress.org/changeset/25321. @maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
bump done, closing as noglsa.
CVE-2013-4340 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4340): wp-admin/includes/post.php in WordPress before 3.6.1 allows remote authenticated users to spoof the authorship of a post by leveraging the Author role and providing a modified user_ID parameter. CVE-2013-4339 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4339): WordPress before 3.6.1 does not properly validate URLs before use in an HTTP redirect, which allows remote attackers to bypass intended redirection restrictions via a crafted string. CVE-2013-4338 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4338): wp-includes/functions.php in WordPress before 3.6.1 does not properly determine whether data has been serialized, which allows remote attackers to execute arbitrary code by triggering erroneous PHP unserialize operations.
Needs more cleanup.
Ping! Maintainer(s), please drop the vulnerable version.
Maintainer timeout. Cleaned up.