25
Agreed that we should respond to valid security report properly.
For this specific report, there is some story behind:
Before the "issues" were released to public, Mr Omid contacted the XOOPS Core Dev Team at very first time. The Core Team evaluated the issue very quickly and responded him immediately. Both Skalpa and me stated clearly in our emails to him that we don't think it a valid vulnerability, it might be taken care of in future a version of XOOPS but it is not necessary to make any "patch" or "change" objectively for it at this moment.
However, I don't know why the report still got spreaded although the XOOPS Core Team had made clear response to the original discoverer.