On August 6th it was announced that there was a major DoS attack vector that affected Word Press and Drupal sites. A security researcher from Salesforce.com's product security team discovered an XML vulnerability affecting both open-source platforms. This attack vector takes advantage of implementations of the XML parser to cause an intense spike in memory and CPU usages. Once applied, it could make an entire website or server unusable.
This XML vulnerability affects WordPress versions 3.5 to 3.9 (the current version) and works on the default installation. It affects Drupal versions 6.x to 7.x (the latest standard version) and also works on the default installation.

Chris Johnson, Director of development for CommonPlaces, Inc. has looked into this security concern, and he believes that this should have no impact on our clients.
'In order for this vector to be used, the tainted xml file must first be placed on the server in order to have the XML parsers actually process it. CommonPlaces' security policy does not allow for the random installation of XML files. Because of this stance it is not possible for an outside attacker to force an XML file to be parsed.'
He added, 'As of now, our security analysis shows that this attack vector should not affect any users hosted by CommonPlaces. In addition, our ongoing maintenance programs tracks and applies security fixes in a responsive manner.'
WordPress and Drupal have released patches for their applications, so users and web hosts who aren't protected by the same security measures that CommonPlaces employs simply need to upgrade to the latest version to protect against the vulnerability.