CVE-2022-3590 Overview
WordPress is affected by an unauthenticated blind Server-Side Request Forgery (SSRF) vulnerability in the pingback feature. Due to a Time-of-Check Time-of-Use (TOCTOU) race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden by WordPress security controls.
Critical Impact
Unauthenticated attackers can exploit this SSRF vulnerability to bypass URL validation and access internal network resources, potentially exposing sensitive internal services and infrastructure.
Affected Products
- WordPress Core (all versions prior to patch)
- WordPress 4.1 and subsequent versions with pingback feature enabled
- Self-hosted WordPress installations with XML-RPC enabled
Discovery Timeline
- 2022-12-14 - CVE-2022-3590 published to NVD
- 2025-04-21 - Last updated in NVD database
Technical Details for CVE-2022-3590
Vulnerability Analysis
This vulnerability represents a classic TOCTOU (Time-of-Check Time-of-Use) race condition, classified under CWE-367. WordPress implements URL validation to prevent pingback requests from reaching internal network hosts. However, the validation occurs at a different point in time than when the actual HTTP request is made, creating a window of opportunity for attackers.
The pingback feature in WordPress allows external sites to notify a WordPress installation when they link to its content. This feature relies on XML-RPC functionality to process incoming pingback requests. When a pingback request is received, WordPress validates the source URL to ensure it doesn't point to internal or forbidden hosts. However, due to the race condition, an attacker can manipulate DNS responses or timing to bypass these checks.
The attack requires no authentication, making it particularly dangerous for internet-facing WordPress installations. Once exploited, attackers can use the WordPress server as a proxy to scan internal networks, access internal services, or exfiltrate sensitive information from hosts that would otherwise be inaccessible from the internet.
Root Cause
The root cause is a TOCTOU race condition in the pingback URL validation logic. WordPress performs hostname resolution and validation checks before making the HTTP request, but the actual request may resolve to a different IP address than what was validated. This temporal gap allows attackers to exploit DNS rebinding or other timing-based techniques to redirect requests to internal hosts after validation has passed.
Attack Vector
The attack is network-based and requires no user interaction or authentication. An attacker sends a specially crafted XML-RPC pingback request to the target WordPress site. By exploiting the race condition between URL validation and the actual HTTP request, the attacker can cause WordPress to make requests to internal hosts that would normally be blocked.
The pingback functionality in WordPress processes XML-RPC requests at the /xmlrpc.php endpoint. When a pingback is initiated, WordPress attempts to verify the source URL by making an HTTP request. The TOCTOU vulnerability allows attackers to bypass the internal host restrictions during this process.
For detailed technical analysis and proof-of-concept information, refer to the SonarSource Blog Post and the WPScan Vulnerability Report.
Detection Methods for CVE-2022-3590
Indicators of Compromise
- Unusual HTTP requests originating from WordPress servers to internal IP ranges (e.g., 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16)
- High volume of XML-RPC pingback requests to /xmlrpc.php from suspicious sources
- DNS queries from the WordPress server for internal hostnames or unusual domains
- Failed or successful connections from WordPress to internal services that should not be accessed
Detection Strategies
- Monitor web server access logs for suspicious patterns of XML-RPC pingback requests targeting /xmlrpc.php
- Implement network-level monitoring to detect outbound connections from WordPress servers to internal network segments
- Deploy DNS monitoring to identify potential DNS rebinding attacks targeting WordPress hosts
- Use web application firewalls (WAF) with rules to detect and block malicious pingback requests
Monitoring Recommendations
- Enable detailed logging for XML-RPC requests and review logs regularly for anomalous activity
- Configure network intrusion detection systems (IDS) to alert on unusual traffic patterns from web servers to internal hosts
- Implement egress filtering and monitor for connections to internal IP ranges from DMZ or web-facing systems
- Set up alerting for high volumes of pingback requests that may indicate exploitation attempts
How to Mitigate CVE-2022-3590
Immediate Actions Required
- Disable the XML-RPC pingback functionality if not required for site operations
- Update WordPress to the latest version that includes the security patch for this vulnerability
- Implement network segmentation to limit the impact of potential SSRF exploitation
- Configure WAF rules to block suspicious XML-RPC pingback requests
Patch Information
WordPress has addressed this vulnerability in subsequent releases. Organizations should update to the latest stable version of WordPress to receive the security fix. Check the official WordPress security releases for specific version information containing the patch.
For detailed vulnerability information, refer to the WPScan Vulnerability Report.
Workarounds
- Disable XML-RPC entirely by adding appropriate filters or using a security plugin that blocks XML-RPC access
- Block access to /xmlrpc.php at the web server or firewall level if pingback functionality is not needed
- Implement egress filtering to prevent the WordPress server from making requests to internal network ranges
- Use a reverse proxy or WAF to filter and validate all incoming XML-RPC requests
# Apache configuration to disable XML-RPC access
<Files xmlrpc.php>
Order Deny,Allow
Deny from all
</Files>
# Nginx configuration to block XML-RPC
location = /xmlrpc.php {
deny all;
return 403;
}
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

