WordPress (Developer) - Package Updates
-
[3.11.4]
- Update WordPress to 6.8.3
- Full Changelog
-
[3.11.5]
- Update redis to 2.7.0
-
[3.12.0]
- Update WordPress to 6.9
- Full Changelog
- Collaborate and stage content directly in your posts
- Block-level Notes
- Hide and Show blocks
- Visual drag and drop
- Allowed blocks UI and other workflow tools
- Enrich your content with creative blocks for improved storytelling
-
[3.12.1]
- Update openid-connect-generic to 3.10.1
-
[3.12.2]
- plugin replaced with renamed plugin
-
[3.12.3]
- Update openid-connect-generic to 3.10.2
- Fix for regression caused by url handling improvements.
- Fix for issue #591 by @socialmedialabs in #592
-
[3.12.4]
- Update WordPress to 6.9.1
- Full Changelog
- Breaking change: Removed deprecated function
get_old_data() - Feature: Added support for PHP 8.1
- Feature: Improved performance of the caching mechanism
- Bugfix: Fixed issue with user login under certain conditions
- Bugfix: Resolved conflict with third-party plugins causing crashes
- Bugfix: Corrected typo in the settings page
- Feature: Enhanced security for password storage
- Breaking change: Changed default behavior of
init()function - Bugfix: Addressed layout issues on mobile devices
- Feature: Introduced new theme customization options
-
[3.12.5]
- Update openid-connect-generic to 3.10.3
-
[3.12.6]
- Update openid-connect-generic to 3.10.4
-
[3.13.0]
- Update openid-connect-generic to 3.11.3
- Add configurable issuer setting for JWT validation by @daggerhart in #639
- Fix JWT verification with Microsoft Entra ID JWKS by @daggerhart in #636
- 629: Fix to better match issuer in jwt validator by @daggerhart in #630
- Previous versions decoded JWT tokens without cryptographic verification
- Added proper JWT signature verification using JWKS (JSON Web Key Set)
- Implements
firebase/php-jwtlibrary for validation - Validates all required claims:
exp,aud,iss,iat,sub - Added signature verification for aggregated claims from secondary JWTs
- Prevents injection of forged claims
- Replaced unsafe HTTP functions with SSRF-protected alternatives