Description
The Fancy Product Designer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.4.8 due to insufficient input sanitization and output escaping in the data-to-image.php and pdf-to-image.php files. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Published: 2025-12-12
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Now
AI Analysis

Impact

The Fancy Product Designer plugin for WordPress permits unauthenticated attackers to upload an SVG file containing malicious JavaScript because data-to-image.php and pdf-to-image.php lack proper sanitization and output escaping. This creates a stored cross‑site scripting vulnerability that can inject arbitrary code into any page serving the SVG, potentially compromising the confidentiality and integrity of all site users. The weakness is classified as a classic input validation flaw (CWE‑79).

Affected Systems

The vulnerability affects the Fancy Product Designer WordPress plugin version 6.4.8 and all earlier releases, distributed by the vendor radykal. Site administrators running the plugin on WordPress sites must apply an update to eliminate this risk.

Risk and Exploitability

The CVSS score of 7.2 indicates moderate‑to‑high severity, while the EPSS score of less than 1% suggests a very low probability of exploitation today. The vulnerability is not listed in CISA’s KEV catalog. Likely attack paths involve any publicly accessible URL that accepts SVG uploads; an attacker can embed JavaScript that executes in the context of any user who accesses the image, thus gaining the same privileges as that user.

Generated by OpenCVE AI on April 22, 2026 at 20:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Fancy Product Designer to the latest patch version (6.4.9 or newer).
  • If upgrading is unavailable, block or remove the ability to upload SVG files to prevent malicious payloads from being stored.
  • Configure the web server to serve SVG files with the X‑Content‑Type‑Options: nosniff header and apply a strict Content Security Policy that blocks inline JavaScript execution.

Generated by OpenCVE AI on April 22, 2026 at 20:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 18 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Radykal
Radykal fancy Product Designer
Wordpress
Wordpress wordpress
Vendors & Products Radykal
Radykal fancy Product Designer
Wordpress
Wordpress wordpress

Fri, 12 Dec 2025 07:00:00 +0000

Type Values Removed Values Added
Description The Fancy Product Designer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.4.8 due to insufficient input sanitization and output escaping in the data-to-image.php and pdf-to-image.php files. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Title Fancy Product Designer <= 6.4.8 - Unauthenticated Stored Cross-Site Scripting via SVG File Upload
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Radykal Fancy Product Designer
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:44:16.753Z

Reserved: 2025-10-31T20:18:32.570Z

Link: CVE-2025-12570

cve-icon Vulnrichment

Updated: 2025-12-18T15:49:57.405Z

cve-icon NVD

Status : Deferred

Published: 2025-12-12T07:15:42.980

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12570

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T21:00:06Z

Weaknesses