CVE-2016-2221

Open redirect vulnerability in the wp_validate_redirect function in wp-includes/pluggable.php in WordPress before 4.4.2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a malformed URL that triggers incorrect hostname parsing, as demonstrated by an https:example.com URL.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:48

Type Values Removed Values Added
References () http://www.debian.org/security/2016/dsa-3472 - () http://www.debian.org/security/2016/dsa-3472 -
References () http://www.securityfocus.com/bid/82463 - () http://www.securityfocus.com/bid/82463 -
References () http://www.securitytracker.com/id/1034933 - () http://www.securitytracker.com/id/1034933 -
References () https://codex.wordpress.org/Version_4.4.2 - Patch () https://codex.wordpress.org/Version_4.4.2 - Patch
References () https://core.trac.wordpress.org/changeset/36444 - Patch () https://core.trac.wordpress.org/changeset/36444 - Patch
References () https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/ - Patch, Vendor Advisory () https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/ - Patch, Vendor Advisory
References () https://wpvulndb.com/vulnerabilities/8377 - () https://wpvulndb.com/vulnerabilities/8377 -

Information

Published : 2016-05-22 01:59

Updated : 2024-11-21 02:48


NVD link : CVE-2016-2221

Mitre link : CVE-2016-2221

CVE.ORG link : CVE-2016-2221


JSON object : View

Products Affected

wordpress

  • wordpress