Highlights
- WordPress 6.9.2 was released to patch ten security vulnerabilities.
- After the update, some websites displayed a blank or white screen.
- The issue was linked to unusual template loading methods used by certain themes.
- WordPress 6.9.3 followed shortly to restore functionality on affected sites.
- WordPress later released 6.9.4 after finding that some security fixes were incomplete.
A rapid series of WordPress security updates
WordPress recently released version 6.9.4, a follow-up security update designed to complete fixes introduced in earlier releases.
The update comes after WordPress 6.9.2, which attempted to resolve ten security vulnerabilities within the platform. Shortly after deployment, however, some website owners reported that their sites stopped displaying content and instead showed a blank or white screen.
Although users could still access the WordPress dashboard and manage content, the website’s front end failed to load properly.
To address the issue quickly, the WordPress development team released version 6.9.3, which restored functionality for affected sites. After further review, the WordPress Security Team identified that some vulnerabilities had not been fully patched, which led to the release of WordPress 6.9.4.
Because this update contains additional security fixes, WordPress has advised website owners to update their installations as soon as possible.
Some WordPress sites crashed after the update
After the release of WordPress 6.9.2, several website owners reported that their sites suddenly stopped displaying content. In many cases, the pages appeared completely blank, often referred to as the “white screen” issue. Despite this, administrators were still able to log into the WordPress dashboard and access their content.
Discussions quickly appeared across developer forums and hosting communities as users tried to understand what caused the problem. Initial speculation suggested the security update itself might be responsible for breaking websites.
Further investigation by the WordPress development team revealed that the issue was related to how certain themes handled template file loading. Some themes relied on a non-standard technique using “stringable objects” to pass template paths. However, WordPress expects the template_include filter to receive a simple string representing the template file path.
When the security patch in version 6.9.2 changed internal behavior, these unsupported implementations caused a conflict, leading to the front end of affected websites failing to render properly.
Although this coding method is not officially supported in WordPress, the development team still moved quickly to release a fix so that affected websites could return to normal operation.
WordPress 6.9.3: a quick bug fix release
To resolve the issues caused by the earlier update, the WordPress team released version 6.9.3 shortly after the reports of broken websites began to surface. This update focused specifically on restoring compatibility with themes that were affected by the changes introduced in version 6.9.2.
The problem occurred because certain themes were using an unconventional method to load template file paths. While this approach is not officially supported within WordPress, the change introduced in the security update unintentionally disrupted those implementations.
In response, WordPress engineers released version 6.9.3 as a fast follow-up update to prevent affected websites from remaining inaccessible. Once installed, the update allowed websites that experienced the white screen issue to return to normal operation.
This quick response demonstrated the WordPress community’s ability to identify issues rapidly and release fixes to maintain platform stability.
Security vulnerabilities identified by researchers
Security researchers also analyzed the vulnerabilities addressed in the WordPress updates. WordPress security company Wordfence published technical details for four of the vulnerabilities, rating them as medium severity with CVSS scores ranging from 4.3 to 6.5.
These vulnerabilities require authentication, meaning an attacker must first obtain some level of user access before attempting to exploit them. Depending on the issue, the required permission level ranges from subscriber accounts to administrator privileges.
One of the most significant issues involved an XML External Entity (XXE) vulnerability in the getID3 media processing library used by WordPress. Under certain conditions, this flaw could allow an authenticated user to read sensitive files from the server by uploading specially crafted media files containing XML metadata.
Other vulnerabilities addressed in the update included authorization issues, stored cross-site scripting (XSS), and weaknesses in specific API and AJAX endpoints. While these issues were rated as moderate in severity, they still represent potential security risks if left unpatched.
WordPress core is vulnerable to XML External Entity (XXE) injection via the bundled getID3 library in versions up to 6.9.1, which could allow authenticated users to read arbitrary files from the server when processing media files containing XML metadata.
Full list of security issues addressed
Across versions 6.9.2, 6.9.3, and 6.9.4, WordPress addressed a total of ten security vulnerabilities affecting different parts of the platform. These issues ranged from authorization weaknesses to cross-site scripting vulnerabilities and library-level security flaws.
While some of the vulnerabilities required authenticated access to exploit, they still represent potential risks for websites that are not properly maintained or updated. Security patches are therefore released quickly to reduce the chances of exploitation.
The vulnerabilities addressed in these updates include the following:
- A blind Server-Side Request Forgery (SSRF) vulnerability
- A POP-chain weakness in the HTML API and Block Registry
- A regular expression denial-of-service (ReDoS) issue related to numeric character references
- A stored cross-site scripting (XSS) vulnerability in navigation menus
- An authorization bypass affecting the
query-attachmentsAJAX endpoint - A stored XSS issue through the
data-wp-binddirective - An XSS vulnerability allowing client-side template overrides in the admin area
- A path traversal vulnerability in the PclZip library
- An authorization bypass affecting the Notes feature
- An XML External Entity (XXE) vulnerability in the external getID3 media library
Together, these fixes improve the overall security posture of WordPress and help prevent attackers from exploiting weaknesses within the core platform.
WordPress Recommends Updating Immediately
Although several of the vulnerabilities identified in these updates are rated as medium severity and require authenticated access, the WordPress Security Team still recommends that website owners install the latest version as soon as possible.
Security vulnerabilities can sometimes be chained together with other weaknesses, allowing attackers to escalate privileges or gain deeper access to a website. Applying updates promptly helps reduce the risk of such exploitation.
WordPress has therefore advised site administrators to update their installations to WordPress 6.9.4, which contains the complete set of security fixes along with the bug fixes introduced in version 6.9.3.
Because this is a security release, WordPress recommends that site owners update their installations immediately to ensure their websites remain protected.
Regular updates are one of the most effective ways to maintain a secure and stable WordPress website. In addition to updating the core platform, website owners should also keep themes and plugins up to date and follow best practices for WordPress security.
What this means for WordPress website owners
The recent sequence of WordPress updates highlights how important it is for website owners to maintain their WordPress installations properly. Security patches, compatibility fixes, and bug updates are released regularly, and delaying updates can leave websites exposed to known vulnerabilities.
At the same time, the incident also shows why websites should rely on properly coded themes and plugins. Non-standard development practices can sometimes create compatibility issues when the WordPress core introduces security or structural changes.
For businesses that depend on their websites for lead generation, marketing, or online sales, ensuring that WordPress updates are applied correctly is essential for both security and performance.
Working with an experienced WordPress development company can help ensure that updates, theme compatibility, and security monitoring are handled properly, reducing the risk of downtime or vulnerabilities.
Final thoughts
The release of WordPress versions 6.9.2, 6.9.3, and 6.9.4 within a short period demonstrates how actively the WordPress community responds to security concerns and platform stability issues.
While the original security update addressed several vulnerabilities, it also exposed compatibility problems with certain themes and required additional fixes to fully resolve all security concerns.
For website owners, the key takeaway is clear: keeping WordPress updated is essential for maintaining a secure and reliable website. Updating to the latest version ensures that all known vulnerabilities are patched and the website continues to function smoothly.
Need help maintaining WordPress website?
Keeping WordPress updated is essential, but managing updates, security patches, theme compatibility, and performance monitoring can become complex for many website owners. A poorly handled update can sometimes lead to downtime, broken functionality, or security risks.
At ICO WebTech, we provide professional WordPress website maintenance services to ensure your website remains secure, updated, and running smoothly. Our team monitors WordPress core updates, manages plugin and theme compatibility, performs regular security checks, and optimizes website performance.
Whether you run a business website, an eCommerce store, or a content-driven platform, our WordPress experts help keep your site protected and performing at its best.




