Multiple SQL injection vulnerabilities in Wordpress before 2.2.3 and Wordpress multi-user (MU) before 1.2.5a allow remote attackers to execute arbitrary SQL commands via the post_type parameter to the pingback.extensions.getPingbacks method in the XMLRPC interface, and other unspecified parameters related to "early database escaping" and missing validation of "query string like parameters."
https://exchange.xforce.ibmcloud.com/vulnerabilities/36578
https://bugzilla.redhat.com/show_bug.cgi?id=285831
http://www.vupen.com/english/advisories/2007/3132
http://www.buayacorp.com/files/wordpress/wordpress-sql-injection-advisory.html
http://wordpress.org/development/2007/09/wordpress-223/
http://trac.wordpress.org/ticket/4770
http://secunia.com/advisories/26796