Bit older but i know that a lot of my colleagues using this system Version 2.11 of WordPress contains some exploitable code placed there by a cracker. An excerpt of the note posted to the WordPress blog this afternoon:It was determined that a cracker had gained user-level access to one of the servers that powers wordpress.org, and had used that access to modify the download file. We have locked down that server for further forensics, but at this time it appears that the 2.1.1 download was the only thing touched by the attack. They modified two files in WP to include code that would allow for remote PHP execution.If you downloaded version 2.1.1 of WordPress within the last week, you should put down the ice cream nachos and upgrade to 2.1.2 right now. Be sure to totally wipe the old files, including the wp-includes. More at WordPress Source: Wired