Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 16 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 16 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Radykal
Radykal fancy Product Designer Wordpress Wordpress wordpress |
|
| Vendors & Products |
Radykal
Radykal fancy Product Designer Wordpress Wordpress wordpress |
Tue, 16 Dec 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Fancy Product Designer plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.4.8. This is due to a time-of-check/time-of-use (TOCTOU) race condition in the 'url' parameter of the fpd_custom_uplod_file AJAX action. The plugin validates the URL by calling getimagesize() first, then later retrieves the same URL using file_get_contents(). This makes it possible for unauthenticated attackers to exploit the timing gap to perform SSRF attacks by serving a valid image during validation, then changing the response to redirect to arbitrary internal or external URLs during the actual fetch. | |
| Title | Fancy Product Designer | WooCommerce WordPress <= 6.4.8 - Unauthenticated Server-Side Request Forgery via Race Condition | |
| Weaknesses | CWE-362 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-12-16T21:35:23.929Z
Reserved: 2025-11-15T02:26:51.064Z
Link: CVE-2025-13231
Updated: 2025-12-16T21:35:20.245Z
Status : Awaiting Analysis
Published: 2025-12-16T09:15:51.813
Modified: 2025-12-16T14:10:11.300
Link: CVE-2025-13231
No data.
OpenCVE Enrichment
Updated: 2025-12-16T17:09:17Z