7.4
CVSSv3

CVE-2016-2221

Published: 22/05/2016 Updated: 04/11/2017
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.4 | Impact Score: 4 | Exploitability Score: 2.8
VMScore: 517
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

Open redirect vulnerability in the wp_validate_redirect function in wp-includes/pluggable.php in WordPress prior to 4.4.2 allows remote malicious users to redirect users to arbitrary web sites and conduct phishing attacks via a malformed URL that triggers incorrect hostname parsing, as demonstrated by an https:example.com URL.

Vulnerable Product Search on Vulmon Subscribe to Product

wordpress wordpress

Vendor Advisories

Debian Bug report logs - #813697 wordpress: New version available: 442 (CVE-2016-2221 CVE-2016-2222) Package: wordpress; Maintainer for wordpress is Craig Small <csmall@debianorg>; Source for wordpress is src:wordpress (PTS, buildd, popcon) Reported by: Christer Mjellem Strand <dilldall@bjorkorg> Date: Thu, 4 Fe ...
Two vulnerabilities were discovered in wordpress, a web blogging tool The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2016-2221 Shailesh Suthar discovered an open redirection vulnerability CVE-2016-2222 Ronni Skansing discovered a server-side request forgery (SSRF) vulnerability For the oldst ...

Github Repositories

Codepath Assignment 9

Project 8 - Pentesting Live Targets Project Stack and Significance Software Security Course Assignment Time spent: 4 hours spent in total Objective: Identify vulnerabilities in three different versions of the Globitek website: blue, green, and red The six possible exploits are: Username Enumeration Insecure Direct Object Reference (IDOR) SQL Injection (SQLi) Cross-Site Scri

Codepath Assignment 9

Project 8 - Pentesting Live Targets Project Stack and Significance Software Security Course Assignment Time spent: 4 hours spent in total Objective: Identify vulnerabilities in three different versions of the Globitek website: blue, green, and red The six possible exploits are: Username Enumeration Insecure Direct Object Reference (IDOR) SQL Injection (SQLi) Cross-Site Scri