HEX
Server: Apache/2
System: Linux server.vm113-cu.cl1.il.proginter.com 4.18.0-553.78.1.el8_10.x86_64 #1 SMP Tue Oct 7 04:15:13 EDT 2025 x86_64
User: regevl (1053)
PHP: 7.4.33
Disabled: exec,system,passthru,shell_exec,proc_close,proc_open,dl,popen,show_source,posix_kill,posix_mkfifo,posix_getpwuid,posix_setpgid,posix_setsid,posix_setuid,posix_setgid,posix_seteuid,posix_setegid,posix_uname
Upload Files
File: /home/regevl/Maildir/new/1567710181.H851326P20823.server.ded1-sh.uk.proginter.com
Return-path: <SRS0=Lei0HC=XA=proginter.com=customer@tll-hospitality.co.il>
Envelope-to: regevl@tll-hospitality.co.il
Delivery-date: Thu, 05 Sep 2019 22:03:01 +0300
Received: from root by server.ded1-sh.uk.proginter.com with local (Exim 4.92.1)
	(envelope-from <customer@proginter.com>)
	id 1i5x25-0005Om-Qs
	for regevl@tll-hospitality.co.il; Thu, 05 Sep 2019 22:03:01 +0300
To: regevl@tll-hospitality.co.il
Subject: [ProgInter Applications] WordPress 5.2.3 now available (security release)
Date: Thu, 5 Sep 2019 20:03:01 +0100
From: customer@proginter.com
Message-ID: <eefc5df13f322166b986e62d56cfea53@server.ded1-sh.uk.proginter.com>
X-Mailer: Installatron Plugin 9.1.46
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

This is an automated email from ProgInter Applications. To unsubscribe from these emails or to change notification settings, login to your web hosting control panel, navigate to the ProgInter Applications tool, and select the installed applications you wish to modify.

An update to WordPress 5.2.3 (security release) is now available for the WordPress installations you are managing using ProgInter Applications. The following can be updated:

- http://itum-nigrin.co.il


The changes for this version are:

This security and maintenance release features 29 fixes and enhancements. Plus, it adds a number of security fixes—see the list below.

Security
* Props to Simon Scannell of RIPS Technologies for finding and disclosing two issues. The first, a cross-site scripting (XSS) vulnerability found in post previews by contributors. The second was a cross-site scripting vulnerability in stored comments. 
* Props to Tim Coen for disclosing an issue where validation and sanitization of a URL could lead to an open redirect. 
* Props to Anshul Jain for disclosing reflected cross-site scripting during media uploads.
* Props to Zhouyuan Yang of Fortinet’s FortiGuard Labs who disclosed a vulnerability for cross-site scripting (XSS) in shortcode previews.
* Props to Ian Dunn of the Core Security Team for finding and disclosing a case where reflected cross-site scripting could be found in the dashboard.
* Props to Soroush Dalili (@irsdl) from NCC Group for disclosing an issue with URL sanitization that can lead to cross-site scripting (XSS) attacks.
* In addition to the above changes, we are also updating jQuery on older versions of WordPress. This change was added in 5.2.1 and is now being brought to older versions.

Login to your web hosting control panel and navigate to the ProgInter Applications tool to update your installed applications.

End of report.