Impact
The Fancy Product Designer plugin for WordPress contains improper error handling in its PDF upload feature, exposing full server filesystem paths and stack traces in error messages. This allows unauthenticated attackers to learn the underlying directory structure of the web application, which can aid in launching additional attacks but is not useful on its own to compromise the site.
Affected Systems
WordPress sites running the Fancy Product Designer plugin by Radykal, all versions up to and including 6.4.8.
Risk and Exploitability
The vulnerability carries a CVSS score of 5.3 and an EPSS of less than 1%, indicating a moderate severity but a very low probability that it is being actively exploited today. It is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is an unauthenticated request to the PDF upload endpoint with a crafted 'pdf' parameter, which causes the plugin to return filesystem paths in the error response. While the information disclosed does not directly lead to a compromise, it provides an attacker with valuable context that can be used to target other, more severe weaknesses.
OpenCVE Enrichment