(Sips more coffee, makes skeptical noises.)
That’s not really a vulnerability in WordPress and here’s why: any DoS attack is background noise. Harmful background noise if it’s your server, but still background noise.
Anyone can write a script and knock down any single server. It’s ~2 minutes of work to do if you type slowly. Apache2 comes with a great load tester that if you ramp up the threads and simultaneous requests, then BAM! unresponsive server.
Now a real vulnerability would be if flooding that WordPress file with info caused it to crash and execute arbitrary code that the attacker planned. Once an attacker can do that, you’ve got a real problem on your hands. The worm that went around hitting pre-2.8.4 code? Now that was a vulnerability.