The Fancy Product Designer plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.4.8. This is due to a time-of-check/time-of-use (TOCTOU) race condition in the 'url' parameter of the fpd_custom_uplod_file AJAX action. The plugin validates the URL by calling getimagesize() first, then later retrieves the same URL using file_get_contents(). This makes it possible for unauthenticated attackers to exploit the timing gap to perform SSRF attacks by serving a valid image during validation, then changing the response to redirect to arbitrary internal or external URLs during the actual fetch.
Metrics
Affected Vendors & Products
References
History
Tue, 16 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Radykal
Radykal fancy Product Designer Wordpress Wordpress wordpress |
|
| Vendors & Products |
Radykal
Radykal fancy Product Designer Wordpress Wordpress wordpress |
Tue, 16 Dec 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Fancy Product Designer plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.4.8. This is due to a time-of-check/time-of-use (TOCTOU) race condition in the 'url' parameter of the fpd_custom_uplod_file AJAX action. The plugin validates the URL by calling getimagesize() first, then later retrieves the same URL using file_get_contents(). This makes it possible for unauthenticated attackers to exploit the timing gap to perform SSRF attacks by serving a valid image during validation, then changing the response to redirect to arbitrary internal or external URLs during the actual fetch. | |
| Title | Fancy Product Designer | WooCommerce WordPress <= 6.4.8 - Unauthenticated Server-Side Request Forgery via Race Condition | |
| Weaknesses | CWE-362 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-12-16T08:20:24.492Z
Updated: 2025-12-16T08:20:24.492Z
Reserved: 2025-11-15T02:26:51.064Z
Link: CVE-2025-13231
No data.
Status : Awaiting Analysis
Published: 2025-12-16T09:15:51.813
Modified: 2025-12-16T14:10:11.300
Link: CVE-2025-13231
No data.