Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15526: CWE-209 Generation of Error Message Containing Sensitive Information in radykal Fancy Product Designer

0
Medium
VulnerabilityCVE-2025-15526cvecve-2025-15526cwe-209
Published: Fri Jan 16 2026 (01/16/2026, 04:44:34 UTC)
Source: CVE Database V5
Vendor/Project: radykal
Product: Fancy Product Designer

Description

CVE-2025-15526 is a medium-severity vulnerability in the Fancy Product Designer WordPress plugin that causes full path disclosure via error messages during PDF upload failures. It allows unauthenticated attackers to obtain server filesystem paths and stack traces, which can aid in further exploitation if combined with other vulnerabilities. The flaw arises from improper error handling that exposes sensitive information in error responses. While the information disclosed is not directly harmful alone, it can facilitate reconnaissance and targeted attacks. No known exploits are currently in the wild, and the vulnerability affects all versions up to 6. 4. 8. The CVSS score is 5. 3, reflecting a network-exploitable issue with no user interaction required. European organizations using this plugin on WordPress sites should prioritize patching or mitigating exposure to reduce risk.

AI-Powered Analysis

AILast updated: 01/16/2026, 05:13:39 UTC

Technical Analysis

CVE-2025-15526 is a vulnerability classified under CWE-209, which involves the generation of error messages containing sensitive information. The Fancy Product Designer plugin for WordPress, widely used for creating customizable product designs on e-commerce sites, contains an improper error handling flaw in its PDF upload functionality. When an error occurs during PDF upload, the plugin discloses full server filesystem paths and stack traces in the error messages returned to the client. This full path disclosure (FPD) vulnerability allows unauthenticated attackers to gain insight into the underlying server directory structure and application stack, which can be leveraged to identify other vulnerabilities or misconfigurations. The vulnerability affects all versions up to and including 6.4.8. The CVSS v3.1 base score is 5.3, indicating a medium severity level with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning it is remotely exploitable without authentication or user interaction, impacts confidentiality by leaking path information, but does not affect integrity or availability. Although the disclosed information alone does not directly compromise the system, it can be a valuable asset for attackers conducting further reconnaissance or chaining with other exploits. No public exploits or active exploitation have been reported to date. The lack of a patch link suggests that a fix may not yet be available, underscoring the importance of temporary mitigations. The vulnerability is particularly relevant for WordPress sites using this plugin, especially those handling PDF uploads in e-commerce or product customization contexts.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily by aiding attackers in gathering sensitive server information that can facilitate more severe attacks such as remote code execution or privilege escalation if other vulnerabilities exist. E-commerce platforms and businesses relying on Fancy Product Designer for product customization are at risk of targeted reconnaissance. Disclosure of full filesystem paths can reveal server configurations, directory structures, and potentially sensitive file locations, increasing the attack surface. While the vulnerability does not directly compromise data integrity or availability, it weakens the security posture and could lead to data breaches or service disruptions if exploited in combination with other flaws. Organizations in sectors with high online retail activity, such as Germany, France, and the UK, may face increased targeting due to the commercial value of their websites. Additionally, GDPR compliance requires minimizing exposure of sensitive information, so this vulnerability could have regulatory implications if exploited.

Mitigation Recommendations

Since no official patch is currently linked, European organizations should implement immediate mitigations to reduce exposure. These include disabling or restricting PDF upload functionality in the Fancy Product Designer plugin until a patch is available. Web application firewalls (WAFs) should be configured to detect and block requests triggering PDF upload errors or attempts to exploit this vulnerability. Custom error handling can be implemented to suppress detailed error messages and stack traces, replacing them with generic error responses that do not reveal server paths. Regularly monitoring web server logs for suspicious activity related to PDF uploads or error message requests is advised. Organizations should also ensure that WordPress core, plugins, and themes are kept up to date and conduct thorough vulnerability assessments to identify and remediate any chained vulnerabilities that could be exploited alongside this issue. Finally, segmenting web servers and limiting access to sensitive directories can reduce the impact of any information disclosure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-15T16:36:27.098Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6969c56d7c726673b6f0ba79

Added to database: 1/16/2026, 4:58:21 AM

Last enriched: 1/16/2026, 5:13:39 AM

Last updated: 1/16/2026, 6:16:01 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats