CVE-2025-15526: CWE-209 Generation of Error Message Containing Sensitive Information in radykal Fancy Product Designer
The Fancy Product Designer plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 6.4.8. This is due to improper error handling in the PDF upload functionality that exposes server filesystem paths and stack traces in error messages. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
AI Analysis
Technical Summary
The Fancy Product Designer plugin for WordPress, widely used for customizable product creation on e-commerce sites, contains a vulnerability identified as CVE-2025-15526. This vulnerability arises from improper error handling in the plugin's PDF upload functionality, which leads to the generation of error messages containing sensitive information such as full server filesystem paths and stack traces. This is classified under CWE-209, which involves the generation of error messages that reveal sensitive information. The flaw affects all versions up to and including 6.4.8. An unauthenticated attacker can exploit this vulnerability remotely without any user interaction by triggering errors during PDF uploads, causing the server to disclose its internal directory structure. Although the disclosed information does not directly allow data theft or system compromise, it significantly aids attackers in reconnaissance, facilitating the identification of other vulnerabilities or misconfigurations that could be exploited for privilege escalation or code execution. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level, with an attack vector of network, no privileges required, and no user interaction needed. There are currently no known exploits in the wild, and no official patches have been released at the time of publication. The vulnerability’s impact is limited to information disclosure, but its presence increases the attack surface and risk profile of affected websites.
Potential Impact
The primary impact of CVE-2025-15526 is information disclosure, specifically full path disclosure of the server filesystem and stack traces. This information can be leveraged by attackers to map the server environment, identify software versions, directory structures, and potentially locate other vulnerabilities or sensitive files. While this vulnerability alone does not allow direct compromise of confidentiality, integrity, or availability, it lowers the barrier for attackers to conduct more targeted and effective attacks such as remote code execution, privilege escalation, or data exfiltration if other vulnerabilities exist. For organizations running e-commerce or business-critical websites using the Fancy Product Designer plugin, this could lead to increased risk of compromise, reputational damage, and financial loss. The vulnerability is exploitable remotely without authentication or user interaction, increasing its risk profile. However, the lack of known exploits and the medium CVSS score suggest that the immediate threat is moderate but should not be ignored.
Mitigation Recommendations
1. Immediately monitor for and apply any official patches or updates released by the plugin vendor addressing this vulnerability. 2. If patches are not yet available, consider temporarily disabling or restricting access to the PDF upload functionality within the Fancy Product Designer plugin to prevent exploitation. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the PDF upload endpoints or error message patterns indicative of exploitation attempts. 4. Configure the web server and PHP environment to suppress detailed error messages and stack traces from being displayed to unauthenticated users, ensuring that error reporting is logged internally but not exposed externally. 5. Conduct a thorough security audit of the WordPress environment and plugins to identify and remediate other potential vulnerabilities that could be chained with this information disclosure. 6. Employ strict access controls and least privilege principles for WordPress admin and plugin management accounts to reduce the risk of further compromise. 7. Regularly review logs for unusual activity related to file uploads or error generation to detect early exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-15526: CWE-209 Generation of Error Message Containing Sensitive Information in radykal Fancy Product Designer
Description
The Fancy Product Designer plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 6.4.8. This is due to improper error handling in the PDF upload functionality that exposes server filesystem paths and stack traces in error messages. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Fancy Product Designer plugin for WordPress, widely used for customizable product creation on e-commerce sites, contains a vulnerability identified as CVE-2025-15526. This vulnerability arises from improper error handling in the plugin's PDF upload functionality, which leads to the generation of error messages containing sensitive information such as full server filesystem paths and stack traces. This is classified under CWE-209, which involves the generation of error messages that reveal sensitive information. The flaw affects all versions up to and including 6.4.8. An unauthenticated attacker can exploit this vulnerability remotely without any user interaction by triggering errors during PDF uploads, causing the server to disclose its internal directory structure. Although the disclosed information does not directly allow data theft or system compromise, it significantly aids attackers in reconnaissance, facilitating the identification of other vulnerabilities or misconfigurations that could be exploited for privilege escalation or code execution. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level, with an attack vector of network, no privileges required, and no user interaction needed. There are currently no known exploits in the wild, and no official patches have been released at the time of publication. The vulnerability’s impact is limited to information disclosure, but its presence increases the attack surface and risk profile of affected websites.
Potential Impact
The primary impact of CVE-2025-15526 is information disclosure, specifically full path disclosure of the server filesystem and stack traces. This information can be leveraged by attackers to map the server environment, identify software versions, directory structures, and potentially locate other vulnerabilities or sensitive files. While this vulnerability alone does not allow direct compromise of confidentiality, integrity, or availability, it lowers the barrier for attackers to conduct more targeted and effective attacks such as remote code execution, privilege escalation, or data exfiltration if other vulnerabilities exist. For organizations running e-commerce or business-critical websites using the Fancy Product Designer plugin, this could lead to increased risk of compromise, reputational damage, and financial loss. The vulnerability is exploitable remotely without authentication or user interaction, increasing its risk profile. However, the lack of known exploits and the medium CVSS score suggest that the immediate threat is moderate but should not be ignored.
Mitigation Recommendations
1. Immediately monitor for and apply any official patches or updates released by the plugin vendor addressing this vulnerability. 2. If patches are not yet available, consider temporarily disabling or restricting access to the PDF upload functionality within the Fancy Product Designer plugin to prevent exploitation. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the PDF upload endpoints or error message patterns indicative of exploitation attempts. 4. Configure the web server and PHP environment to suppress detailed error messages and stack traces from being displayed to unauthenticated users, ensuring that error reporting is logged internally but not exposed externally. 5. Conduct a thorough security audit of the WordPress environment and plugins to identify and remediate other potential vulnerabilities that could be chained with this information disclosure. 6. Employ strict access controls and least privilege principles for WordPress admin and plugin management accounts to reduce the risk of further compromise. 7. Regularly review logs for unusual activity related to file uploads or error generation to detect early exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-15T16:36:27.098Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6969c56d7c726673b6f0ba79
Added to database: 1/16/2026, 4:58:21 AM
Last enriched: 2/27/2026, 12:03:56 PM
Last updated: 3/25/2026, 5:18:17 PM
Views: 81
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.