Description: A vulnerability has been reported in WordPress, which can be exploited by malicious people to conduct SQL injection attacks. Input passed to the "cat_ID" parameter isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerability has been reported in version 1.5. Other versions may also be affected. Solution: Update to version 1.5.1.2.
web-apps please bump.
SuperLag, please bump. Don't forget to update the metadata.xml with your info.
I committed 1.5.1.2 to the tree prior to this bug being created, so this should be taken care of.
So this is ready too
GLSA 200506-04