In Serendipity prior to 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., 127.1) or a 30x (aka Redirection) HTTP status code.
s9y serendipity