Eh? The API, sure in context of an application, but whatabout interwiki.
But more importantly:
http://wikia.com/index.php?title=Template:WikiLogo&action=edit
~Daniel Friesen(Dantman, Nadir-Seen-Fire) of:
-The Nadir-Point Group (http://nadir-point.com)
--It's Wiki-Tools subgroup (http://wiki-tools.com)
--The ElectronicMe project (http://electronic-me.org)
--Games-G.P.S. (http://ggps.org)
-And Wikia ACG on Wikia.com (http://wikia.com/wiki/Wikia_ACG)
--Animepedia (http://anime.wikia.com)
--Narutopedia (http://naruto.wikia.com)
Tim Starling wrote:
Daniel Schwen wrote:
  
Even if Wikimedia is not vulnerable, many other MediaWiki installations
will be.
      
I'm not convinced yet that WikiMedia is not vulnerable!
While at first the upload.wikimedia.org subdomain seemed to offer protection, 
my tests at

http://toolserver.org/~dschwen/test.html

indicate that when using the url 
http://commons.wikimedia.org/wiki/Special:FilePath/Gifar.gif to load the 
applet, it has no rights to connect to upload.wikimedia.org

Unfortunately it is late right now, so I don't have time to confirm if the 
server of origin is indeed set to commons.wikimedia.org as it seems at first 
glance, but if it is then I think I found an attack vector.
    

Does anyone actually use Special:FilePath? This is not the first security
hole opened up by it, and the API could easily serve the same purpose.
Could it be removed?

-- Tim Starling