CVE-2021-4334
📋 TL;DR
The Fancy Product Designer WordPress plugin has an authorization vulnerability that allows authenticated users with subscriber-level permissions to modify site options, including changing the default user role to administrator. This enables privilege escalation where low-privilege users can gain administrative access. WordPress sites using vulnerable plugin versions are affected.
💻 Affected Systems
- Fancy Product Designer WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative access to the WordPress site, allowing complete control including content modification, plugin/theme installation, user management, and potential server compromise.
Likely Case
Authenticated attackers escalate privileges to administrator and install backdoors, steal data, or deface the website.
If Mitigated
With proper access controls and monitoring, exploitation attempts are detected and blocked before privilege escalation occurs.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once authenticated. Public exploit details are available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.7.0 and later
Vendor Advisory: https://support.fancyproductdesigner.com/support/discussions/topics/13000029981
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Fancy Product Designer. 4. Click 'Update Now' if available. 5. Alternatively, download version 4.7.0+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the Fancy Product Designer plugin until patched
wp plugin deactivate fancy-product-designer
Restrict user registration
allDisable new user registration to prevent attackers from creating subscriber accounts
🧯 If You Can't Patch
- Implement strict access controls and monitor user privilege changes
- Use web application firewall rules to block suspicious option modification requests
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Fancy Product Designer version. If version is 4.6.9 or lower, you are vulnerable.
Check Version:
wp plugin get fancy-product-designer --field=version
Verify Fix Applied:
Verify plugin version is 4.7.0 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- WordPress logs showing option modifications by non-admin users
- User role changes from subscriber to administrator
- POST requests to fpd_update_options function
Network Indicators:
- HTTP POST requests to /wp-admin/admin-ajax.php with action=fpd_update_options
SIEM Query:
source="wordpress.log" AND ("option_name"="default_role" OR "fpd_update_options") AND user_role="subscriber"
🔗 References
- https://support.fancyproductdesigner.com/support/discussions/topics/13000029981
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ea097cb7-85f4-4b6d-9f29-bc2636993f21?source=cve
- https://support.fancyproductdesigner.com/support/discussions/topics/13000029981
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ea097cb7-85f4-4b6d-9f29-bc2636993f21?source=cve