Some vulnerabilities have been reported in Wordpress, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct SQL injection attacks. 1) The "unfiltered_html" privilege feature can be bypassed by adding a field named "no_filter". This can be exploited by malicious users without the "unfiltered_html" privilege to e.g. post blog entries with arbitrary HTML and script code via specially crafted POST requests. 2) Input passed to certain parameters (e.g. the "post_type" parameter of the URL passed to the "pingback.extensions.getPingbacks()" XMLRPC method) is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerabilities are reported in Wordpress prior to 2.2.3 and Wordpress MU prior to 1.2.5a. Solution: Update to Wordpress version 2.2.3 or Wordpress MU version 1.2.5a.
Oops, rbu just told me that 2.2.3 is already in the tree. Closing with regards to bug 168529.
*** Bug 192409 has been marked as a duplicate of this bug. ***
the portage tree used to contain a vulnerable version of wordpress...
(In reply to comment #3) > the portage tree used to contain a vulnerable version of wordpress... > ... and fixed. Closing with [noglsa] because wordpress is p.masked