๐Ÿ” CVE Alert

CVE-2025-13231

MEDIUM 6.5

Fancy Product Designer | WooCommerce WordPress <= 6.4.8 - Unauthenticated Server-Side Request Forgery via Race Condition

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

The Fancy Product Designer plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.4.8. This is due to a time-of-check/time-of-use (TOCTOU) race condition in the 'url' parameter of the fpd_custom_uplod_file AJAX action. The plugin validates the URL by calling getimagesize() first, then later retrieves the same URL using file_get_contents(). This makes it possible for unauthenticated attackers to exploit the timing gap to perform SSRF attacks by serving a valid image during validation, then changing the response to redirect to arbitrary internal or external URLs during the actual fetch.

CWE CWE-362
Vendor radykal
Product fancy product designer
Published Dec 16, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for radykal fancy product designer

Be the first to know when new medium vulnerabilities affecting radykal fancy product designer are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

radykal / Fancy Product Designer
0 โ‰ค 6.4.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/c56ec6ae-5b75-4cbb-aedd-f318fddc7bf0?source=cve support.fancyproductdesigner.com: https://support.fancyproductdesigner.com/support/discussions/topics/13000036024

Credits

Muhammad Zeeshan