How does this affect us with b2evo? Is it looked into?
http://secunia.com/advisories/16431/
XML-RPC for PHP Nested XML Tags PHP Code Execution
Description:
Stefan Esser has reported a vulnerability in XML-RPC, which can be exploited by malicious people to compromise a vulnerable system.
Certain XML tags that are nested in parsed documents are not properly sanitised before being used in an "eval()" call. This can be exploited to execute arbitrary PHP code on a vulnerable system.
The vulnerability has been reported in versions 1.1.1 and prior.
Solution:
Update to version 1.2.
I'm to remove 'xmlrpc.php' file until François releases a new patch.