Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13439: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in radykal Fancy Product Designer

0
Medium
VulnerabilityCVE-2025-13439cvecve-2025-13439cwe-200
Published: Tue Dec 16 2025 (12/16/2025, 07:21:05 UTC)
Source: CVE Database V5
Vendor/Project: radykal
Product: Fancy Product Designer

Description

The Fancy Product Designer plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 6.4.8. This is due to insufficient validation of user-supplied input in the 'url' parameter of the fpd_custom_uplod_file AJAX action, which flows directly into the getimagesize() function without sanitization. While direct exploitation via PHP filter chains is blocked on PHP 8+ due to a separate code bug in the plugin, the vulnerability can be exploited via a TOCTOU race condition (CVE-2025-13231) also present in the same plugin, or may be directly exploitable on PHP 7.x installations. This makes it possible for unauthenticated attackers to read arbitrary sensitive files from the server, including wp-config.php.

AI-Powered Analysis

AILast updated: 12/16/2025, 07:47:56 UTC

Technical Analysis

CVE-2025-13439 is a medium-severity vulnerability in the Fancy Product Designer plugin for WordPress, maintained by radykal, affecting all versions up to and including 6.4.8. The root cause is insufficient sanitization of the user-supplied 'url' parameter in the 'fpd_custom_uplod_file' AJAX action. This parameter is passed directly to PHP's getimagesize() function without proper validation, enabling attackers to manipulate input to read arbitrary files on the server. On PHP 7.x installations, this can be exploited directly, allowing unauthenticated attackers to disclose sensitive files such as wp-config.php, which contains database credentials and other secrets. On PHP 8 and above, direct exploitation is blocked due to a separate plugin bug; however, attackers can leverage a time-of-check to time-of-use (TOCTOU) race condition (CVE-2025-13231) present in the same plugin to bypass this restriction. The vulnerability does not require authentication or user interaction but has a high attack complexity, reflected in its CVSS vector (AV:N/AC:H/PR:N/UI:N). Although no known exploits are currently observed in the wild, the potential for sensitive data exposure is significant, as wp-config.php and other files could reveal critical configuration details. The vulnerability is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The lack of patch links indicates that fixes may not yet be publicly available, underscoring the need for vigilance and interim protective measures.

Potential Impact

For European organizations, especially those operating e-commerce or content management sites using WordPress with the Fancy Product Designer plugin, this vulnerability poses a risk of sensitive information disclosure. Exposure of wp-config.php can lead to database credential theft, enabling attackers to escalate privileges, access customer data, or deploy further attacks such as ransomware or data exfiltration. Organizations running PHP 7.x are at higher risk due to easier exploitation paths. The impact on confidentiality is high, while integrity and availability remain unaffected. This could undermine customer trust, lead to regulatory non-compliance (e.g., GDPR violations), and cause financial and reputational damage. The medium CVSS score reflects the balance between the severity of data exposure and the complexity of exploitation. Given the widespread use of WordPress in Europe and the popularity of product customization plugins in online retail, the threat is relevant to many sectors including retail, manufacturing, and digital services.

Mitigation Recommendations

1. Monitor for official patches or updates from the plugin vendor and apply them immediately once available. 2. Until patches are released, restrict access to sensitive files such as wp-config.php via web server configuration (e.g., .htaccess rules) to prevent unauthorized reads. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the 'fpd_custom_uplod_file' action or unusual 'url' parameter values. 4. Upgrade PHP installations to version 8 or higher to reduce direct exploitability, while noting that the TOCTOU race condition still requires mitigation. 5. Conduct regular security audits and file integrity monitoring to detect unauthorized file access or changes. 6. Limit plugin usage to trusted sources and consider disabling or removing the Fancy Product Designer plugin if not essential. 7. Educate development and operations teams about the risks of unsanitized input and TOCTOU vulnerabilities to improve secure coding practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-19T19:03:47.252Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69410b259bfd1ab9ba9ec084

Added to database: 12/16/2025, 7:32:53 AM

Last enriched: 12/16/2025, 7:47:56 AM

Last updated: 12/16/2025, 10:55:57 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats