Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15526: CWE-209 Generation of Error Message Containing Sensitive Information in radykal Fancy Product Designer

0
Medium
VulnerabilityCVE-2025-15526cvecve-2025-15526cwe-209
Published: Fri Jan 16 2026 (01/16/2026, 04:44:34 UTC)
Source: CVE Database V5
Vendor/Project: radykal
Product: Fancy Product Designer

Description

The Fancy Product Designer plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 6.4.8. This is due to improper error handling in the PDF upload functionality that exposes server filesystem paths and stack traces in error messages. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 12:03:56 UTC

Technical Analysis

The Fancy Product Designer plugin for WordPress, widely used for customizable product creation on e-commerce sites, contains a vulnerability identified as CVE-2025-15526. This vulnerability arises from improper error handling in the plugin's PDF upload functionality, which leads to the generation of error messages containing sensitive information such as full server filesystem paths and stack traces. This is classified under CWE-209, which involves the generation of error messages that reveal sensitive information. The flaw affects all versions up to and including 6.4.8. An unauthenticated attacker can exploit this vulnerability remotely without any user interaction by triggering errors during PDF uploads, causing the server to disclose its internal directory structure. Although the disclosed information does not directly allow data theft or system compromise, it significantly aids attackers in reconnaissance, facilitating the identification of other vulnerabilities or misconfigurations that could be exploited for privilege escalation or code execution. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level, with an attack vector of network, no privileges required, and no user interaction needed. There are currently no known exploits in the wild, and no official patches have been released at the time of publication. The vulnerability’s impact is limited to information disclosure, but its presence increases the attack surface and risk profile of affected websites.

Potential Impact

The primary impact of CVE-2025-15526 is information disclosure, specifically full path disclosure of the server filesystem and stack traces. This information can be leveraged by attackers to map the server environment, identify software versions, directory structures, and potentially locate other vulnerabilities or sensitive files. While this vulnerability alone does not allow direct compromise of confidentiality, integrity, or availability, it lowers the barrier for attackers to conduct more targeted and effective attacks such as remote code execution, privilege escalation, or data exfiltration if other vulnerabilities exist. For organizations running e-commerce or business-critical websites using the Fancy Product Designer plugin, this could lead to increased risk of compromise, reputational damage, and financial loss. The vulnerability is exploitable remotely without authentication or user interaction, increasing its risk profile. However, the lack of known exploits and the medium CVSS score suggest that the immediate threat is moderate but should not be ignored.

Mitigation Recommendations

1. Immediately monitor for and apply any official patches or updates released by the plugin vendor addressing this vulnerability. 2. If patches are not yet available, consider temporarily disabling or restricting access to the PDF upload functionality within the Fancy Product Designer plugin to prevent exploitation. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the PDF upload endpoints or error message patterns indicative of exploitation attempts. 4. Configure the web server and PHP environment to suppress detailed error messages and stack traces from being displayed to unauthenticated users, ensuring that error reporting is logged internally but not exposed externally. 5. Conduct a thorough security audit of the WordPress environment and plugins to identify and remediate other potential vulnerabilities that could be chained with this information disclosure. 6. Employ strict access controls and least privilege principles for WordPress admin and plugin management accounts to reduce the risk of further compromise. 7. Regularly review logs for unusual activity related to file uploads or error generation to detect early exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-15T16:36:27.098Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6969c56d7c726673b6f0ba79

Added to database: 1/16/2026, 4:58:21 AM

Last enriched: 2/27/2026, 12:03:56 PM

Last updated: 3/26/2026, 10:29:52 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses