Server-Side Request Forgery (SSRF)
Paranoidhttp versions prior to 0.3.0 allow SSRF because "[::]" is equivalent to the "127.0.0.1" address, but does not match the filter for private addresses.
CWE-918 - Server-Side Request Forgery (SSRF)
Server-side request forgery (SSRF) is a weakness that allows an attacker to send an arbitrary request, making it appear that the request was sent by the server. This request may bypass a firewall that would normally prevent direct access to the URL. The impact of this vulnerability can vary from unauthorized access to files and sensitive information to remote code execution.