I/O Sanity Failures in _wp_specialchars()
|Reported by:||miqrogroove||Owned by:|
$string = str_replace( array( '|wp_entity|', '|/wp_entity|' ), array( '&', ';' ), $string );
This bug was reported to the security group during the 3.2 RC1 development cycle.
A patch was submitted to the security group prior to 3.2 RC1.
Today we agreed to add the patch to a Trac ticket.
I believe this bug affects all versions of WordPress from version 2.8 through 3.2.1.
Anonymous users can break comment feed validation by injecting the phrase |wp_entity| into the body of any comment in the feed.
Any other output from _wp_specialchars() would be similarly vulnerable, but the comment feed is the most obvious example.