{"id":"CVE-2016-2222","details":"The wp_http_validate_url function in wp-includes/http.php in WordPress before 4.4.2 allows remote attackers to conduct server-side request forgery (SSRF) attacks via a zero value in the first octet of an IPv4 address in the u parameter to wp-admin/press-this.php.","modified":"2026-04-16T14:50:08.462146Z","published":"2016-05-22T01:59:15.273Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/82454"},{"type":"WEB","url":"http://www.securitytracker.com/id/1034933"},{"type":"WEB","url":"https://core.trac.wordpress.org/changeset/36435"},{"type":"WEB","url":"https://news.ycombinator.com/item?id=20433070"},{"type":"WEB","url":"https://wpvulndb.com/vulnerabilities/8376"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3472"},{"type":"FIX","url":"https://codex.wordpress.org/Version_4.4.2"},{"type":"FIX","url":"https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/"},{"type":"EVIDENCE","url":"https://hackerone.com/reports/110801"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wordpress/wordpress","events":[{"introduced":"0"},{"last_affected":"80d1f99a89bd7c892d2dccec915e62e8e4a6f8bb"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"4.4.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:wordpress:wordpress:4.4.1:*:*:*:*:*:*:*"}}],"versions":["4.4.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2222.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"}]}