{"id":302,"date":"2007-03-05T13:05:16","date_gmt":"2007-03-05T05:05:16","guid":{"rendered":"http:\/\/www.whoisandrewwee.com\/blogging\/wordpress-212-emergency-upgrade-released\/"},"modified":"2007-03-05T13:05:16","modified_gmt":"2007-03-05T05:05:16","slug":"wordpress-212-emergency-upgrade-released","status":"publish","type":"post","link":"http:\/\/whoisandrewwee.com\/blogging\/wordpress-212-emergency-upgrade-released\/","title":{"rendered":"WordPress 2.1.2 Emergency Upgrade Released"},"content":{"rendered":"

Take note if you’re blogging on the WordPress Platform, a cracker has introduced a security exploit into one of the WordPress 2.1.1 download servers at WordPress.org, which could potentially open security holes in your installation.<\/p>\n

For the WordPress development team to label this as a “WordPress 2.1.1 Dangerous, Upgrade<\/a>” hints at the severity of this.<\/p>\n

WordPress upgrades can involve some pain, especially if your existing plugins may not be fully compatible with the new code.<\/p>\n

As always:<\/p>\n