CVE-2025-13439: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in radykal Fancy Product Designer
The Fancy Product Designer plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 6.4.8. This is due to insufficient validation of user-supplied input in the 'url' parameter of the fpd_custom_uplod_file AJAX action, which flows directly into the getimagesize() function without sanitization. While direct exploitation via PHP filter chains is blocked on PHP 8+ due to a separate code bug in the plugin, the vulnerability can be exploited via a TOCTOU race condition (CVE-2025-13231) also present in the same plugin, or may be directly exploitable on PHP 7.x installations. This makes it possible for unauthenticated attackers to read arbitrary sensitive files from the server, including wp-config.php.
AI Analysis
Technical Summary
CVE-2025-13439 is a medium-severity vulnerability in the Fancy Product Designer plugin for WordPress, maintained by radykal, affecting all versions up to and including 6.4.8. The root cause is insufficient sanitization of the user-supplied 'url' parameter in the 'fpd_custom_uplod_file' AJAX action. This parameter is passed directly to PHP's getimagesize() function without proper validation, enabling attackers to manipulate input to read arbitrary files on the server. On PHP 7.x installations, this can be exploited directly, allowing unauthenticated attackers to disclose sensitive files such as wp-config.php, which contains database credentials and other secrets. On PHP 8 and above, direct exploitation is blocked due to a separate plugin bug; however, attackers can leverage a time-of-check to time-of-use (TOCTOU) race condition (CVE-2025-13231) present in the same plugin to bypass this restriction. The vulnerability does not require authentication or user interaction but has a high attack complexity, reflected in its CVSS vector (AV:N/AC:H/PR:N/UI:N). Although no known exploits are currently observed in the wild, the potential for sensitive data exposure is significant, as wp-config.php and other files could reveal critical configuration details. The vulnerability is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The lack of patch links indicates that fixes may not yet be publicly available, underscoring the need for vigilance and interim protective measures.
Potential Impact
For European organizations, especially those operating e-commerce or content management sites using WordPress with the Fancy Product Designer plugin, this vulnerability poses a risk of sensitive information disclosure. Exposure of wp-config.php can lead to database credential theft, enabling attackers to escalate privileges, access customer data, or deploy further attacks such as ransomware or data exfiltration. Organizations running PHP 7.x are at higher risk due to easier exploitation paths. The impact on confidentiality is high, while integrity and availability remain unaffected. This could undermine customer trust, lead to regulatory non-compliance (e.g., GDPR violations), and cause financial and reputational damage. The medium CVSS score reflects the balance between the severity of data exposure and the complexity of exploitation. Given the widespread use of WordPress in Europe and the popularity of product customization plugins in online retail, the threat is relevant to many sectors including retail, manufacturing, and digital services.
Mitigation Recommendations
1. Monitor for official patches or updates from the plugin vendor and apply them immediately once available. 2. Until patches are released, restrict access to sensitive files such as wp-config.php via web server configuration (e.g., .htaccess rules) to prevent unauthorized reads. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the 'fpd_custom_uplod_file' action or unusual 'url' parameter values. 4. Upgrade PHP installations to version 8 or higher to reduce direct exploitability, while noting that the TOCTOU race condition still requires mitigation. 5. Conduct regular security audits and file integrity monitoring to detect unauthorized file access or changes. 6. Limit plugin usage to trusted sources and consider disabling or removing the Fancy Product Designer plugin if not essential. 7. Educate development and operations teams about the risks of unsanitized input and TOCTOU vulnerabilities to improve secure coding practices.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-13439: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in radykal Fancy Product Designer
Description
The Fancy Product Designer plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 6.4.8. This is due to insufficient validation of user-supplied input in the 'url' parameter of the fpd_custom_uplod_file AJAX action, which flows directly into the getimagesize() function without sanitization. While direct exploitation via PHP filter chains is blocked on PHP 8+ due to a separate code bug in the plugin, the vulnerability can be exploited via a TOCTOU race condition (CVE-2025-13231) also present in the same plugin, or may be directly exploitable on PHP 7.x installations. This makes it possible for unauthenticated attackers to read arbitrary sensitive files from the server, including wp-config.php.
AI-Powered Analysis
Technical Analysis
CVE-2025-13439 is a medium-severity vulnerability in the Fancy Product Designer plugin for WordPress, maintained by radykal, affecting all versions up to and including 6.4.8. The root cause is insufficient sanitization of the user-supplied 'url' parameter in the 'fpd_custom_uplod_file' AJAX action. This parameter is passed directly to PHP's getimagesize() function without proper validation, enabling attackers to manipulate input to read arbitrary files on the server. On PHP 7.x installations, this can be exploited directly, allowing unauthenticated attackers to disclose sensitive files such as wp-config.php, which contains database credentials and other secrets. On PHP 8 and above, direct exploitation is blocked due to a separate plugin bug; however, attackers can leverage a time-of-check to time-of-use (TOCTOU) race condition (CVE-2025-13231) present in the same plugin to bypass this restriction. The vulnerability does not require authentication or user interaction but has a high attack complexity, reflected in its CVSS vector (AV:N/AC:H/PR:N/UI:N). Although no known exploits are currently observed in the wild, the potential for sensitive data exposure is significant, as wp-config.php and other files could reveal critical configuration details. The vulnerability is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The lack of patch links indicates that fixes may not yet be publicly available, underscoring the need for vigilance and interim protective measures.
Potential Impact
For European organizations, especially those operating e-commerce or content management sites using WordPress with the Fancy Product Designer plugin, this vulnerability poses a risk of sensitive information disclosure. Exposure of wp-config.php can lead to database credential theft, enabling attackers to escalate privileges, access customer data, or deploy further attacks such as ransomware or data exfiltration. Organizations running PHP 7.x are at higher risk due to easier exploitation paths. The impact on confidentiality is high, while integrity and availability remain unaffected. This could undermine customer trust, lead to regulatory non-compliance (e.g., GDPR violations), and cause financial and reputational damage. The medium CVSS score reflects the balance between the severity of data exposure and the complexity of exploitation. Given the widespread use of WordPress in Europe and the popularity of product customization plugins in online retail, the threat is relevant to many sectors including retail, manufacturing, and digital services.
Mitigation Recommendations
1. Monitor for official patches or updates from the plugin vendor and apply them immediately once available. 2. Until patches are released, restrict access to sensitive files such as wp-config.php via web server configuration (e.g., .htaccess rules) to prevent unauthorized reads. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the 'fpd_custom_uplod_file' action or unusual 'url' parameter values. 4. Upgrade PHP installations to version 8 or higher to reduce direct exploitability, while noting that the TOCTOU race condition still requires mitigation. 5. Conduct regular security audits and file integrity monitoring to detect unauthorized file access or changes. 6. Limit plugin usage to trusted sources and consider disabling or removing the Fancy Product Designer plugin if not essential. 7. Educate development and operations teams about the risks of unsanitized input and TOCTOU vulnerabilities to improve secure coding practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-19T19:03:47.252Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69410b259bfd1ab9ba9ec084
Added to database: 12/16/2025, 7:32:53 AM
Last enriched: 12/16/2025, 7:47:56 AM
Last updated: 12/16/2025, 10:55:57 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
User Data Compromised in SoundCloud Hack
MediumCVE-2025-14002: CWE-287 Improper Authentication in whyun WPCOM Member
HighCVE-2025-13231: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in radykal Fancy Product Designer
MediumCVE-2025-68088: Missing Authorization in merkulove Huger for Elementor
UnknownCVE-2025-68087: Missing Authorization in merkulove Modalier for Elementor
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.