Attention Bloggers: Wordpress 2.1.1 compromised
"Long story short: If you downloaded WordPress 2.1.1 within the past 3-4 days, your files may include a security exploit that was added by a cracker, and you should upgrade all of your files to 2.1.2 immediately. ... It was determined that a cracker had gained user-level access to one of the servers that powers wordpress.org, and had used that access to modify the download file. We have locked down that server for further forensics, but at this time it appears that the 2.1.1 download was the only thing touched by the attack. They modified two files in WP to include code that would allow for remote PHP execution."
Wordpress recommends that everybody upgrade to version 2.1.2 as soon as possible and spread the word to anybody that we know is running 2.1.1, and also warn our Web hosts. Network administrators are advised to block access to “theme.php” and “feed.php”, and any query string with “ix=” or “iz=” in it.