CVE-2021-4334

8.8 HIGH

📋 TL;DR

The Fancy Product Designer WordPress plugin has an authorization vulnerability that allows authenticated users with subscriber-level permissions to modify site options, including changing the default user role to administrator. This enables privilege escalation where low-privilege users can gain administrative access. WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Fancy Product Designer WordPress Plugin
Versions: Up to and including 4.6.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Any authenticated user (including subscribers) can exploit this.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to the WordPress site, allowing complete control including content modification, plugin/theme installation, user management, and potential server compromise.

🟠

Likely Case

Authenticated attackers escalate privileges to administrator and install backdoors, steal data, or deface the website.

🟢

If Mitigated

With proper access controls and monitoring, exploitation attempts are detected and blocked before privilege escalation occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. Public exploit details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.7.0 and later

Vendor Advisory: https://support.fancyproductdesigner.com/support/discussions/topics/13000029981

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Fancy Product Designer. 4. Click 'Update Now' if available. 5. Alternatively, download version 4.7.0+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Fancy Product Designer plugin until patched

wp plugin deactivate fancy-product-designer

Restrict user registration

all

Disable new user registration to prevent attackers from creating subscriber accounts

🧯 If You Can't Patch

  • Implement strict access controls and monitor user privilege changes
  • Use web application firewall rules to block suspicious option modification requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Fancy Product Designer version. If version is 4.6.9 or lower, you are vulnerable.

Check Version:

wp plugin get fancy-product-designer --field=version

Verify Fix Applied:

Verify plugin version is 4.7.0 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • WordPress logs showing option modifications by non-admin users
  • User role changes from subscriber to administrator
  • POST requests to fpd_update_options function

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action=fpd_update_options

SIEM Query:

source="wordpress.log" AND ("option_name"="default_role" OR "fpd_update_options") AND user_role="subscriber"

🔗 References

📤 Share & Export