Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13439: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in radykal Fancy Product Designer

0
Medium
VulnerabilityCVE-2025-13439cvecve-2025-13439cwe-200
Published: Tue Dec 16 2025 (12/16/2025, 07:21:05 UTC)
Source: CVE Database V5
Vendor/Project: radykal
Product: Fancy Product Designer

Description

The Fancy Product Designer plugin for WordPress is vulnerable to Information Disclosure and PHAR Deserialization in all versions up to, and including, 6.4.8. This is due to insufficient validation of user-supplied input in the 'url' parameter of the 'fpd_custom_uplod_file' AJAX action, which flows directly into the 'getimagesize' function without sanitization. This makes it possible for unauthenticated attackers to read arbitrary sensitive files from the server, including wp-config.php.

AI-Powered Analysis

AILast updated: 01/22/2026, 20:09:42 UTC

Technical Analysis

The Fancy Product Designer plugin for WordPress, widely used for customizing product visuals in e-commerce, contains a vulnerability identified as CVE-2025-13439. This vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The root cause lies in the insufficient validation of user-supplied input in the 'url' parameter of the AJAX action 'fpd_custom_uplod_file'. Specifically, the parameter is passed directly to the PHP getimagesize function without any sanitization or validation, allowing attackers to manipulate the input to read arbitrary files on the server. Since getimagesize attempts to read image metadata, an attacker can supply a path to sensitive files such as wp-config.php, which contains database credentials and other critical configuration details. The vulnerability does not require authentication or user interaction, making it accessible to remote unauthenticated attackers. However, the attack complexity is rated high due to the need to craft precise requests and possibly bypass other security controls. The CVSS 3.1 base score is 5.9 (medium), reflecting a significant confidentiality impact but no effect on integrity or availability. No patches or official fixes have been published yet, and no known exploits are reported in the wild. This vulnerability affects all versions up to and including 6.4.8 of the plugin. Given the plugin’s popularity in WordPress e-commerce environments, exploitation could lead to leakage of sensitive data, potentially facilitating further attacks such as database compromise or site takeover.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WordPress and the Fancy Product Designer plugin, this vulnerability poses a serious confidentiality risk. Exposure of wp-config.php or similar files can reveal database credentials, API keys, and other sensitive configuration data, enabling attackers to escalate privileges, access customer data, or disrupt business operations. The impact is particularly critical for organizations handling personal data under GDPR, as data breaches could lead to regulatory penalties and reputational damage. The vulnerability does not directly affect system integrity or availability, but the information disclosed can be leveraged for more damaging attacks. European businesses with limited security monitoring or delayed patching cycles are at higher risk. Additionally, the lack of authentication requirement means that attackers can scan and exploit vulnerable sites en masse, increasing the threat surface. The medium severity score suggests that while the vulnerability is not trivial to exploit, the potential damage from successful exploitation is significant enough to warrant prompt attention.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the 'fpd_custom_uplod_file' AJAX endpoint by implementing IP whitelisting or requiring authentication to reduce exposure. 2. Apply strict input validation and sanitization on the 'url' parameter to ensure only legitimate image URLs or paths are processed, preventing arbitrary file reads. 3. Use web application firewalls (WAFs) to detect and block suspicious requests targeting this vulnerability, including anomalous AJAX calls with unusual parameters. 4. Monitor server logs for repeated or unusual access patterns to the AJAX endpoint that could indicate exploitation attempts. 5. If possible, disable or remove the Fancy Product Designer plugin until a vendor patch is released. 6. Keep WordPress core and all plugins updated regularly and subscribe to vendor security advisories for timely patching. 7. Limit file permissions on the server to restrict access to sensitive files like wp-config.php, minimizing the impact of any file disclosure. 8. Conduct security audits and penetration testing focused on plugin vulnerabilities to identify and remediate similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-19T19:03:47.252Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69410b259bfd1ab9ba9ec084

Added to database: 12/16/2025, 7:32:53 AM

Last enriched: 1/22/2026, 8:09:42 PM

Last updated: 2/7/2026, 11:42:58 AM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats