CVE-2025-13231

6.5 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform Server-Side Request Forgery (SSRF) attacks against WordPress sites using the Fancy Product Designer plugin. Attackers can exploit a timing gap between URL validation and file retrieval to redirect requests to internal or external systems. All WordPress sites with vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Fancy Product Designer WordPress Plugin
Versions: All versions up to and including 6.4.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the plugin enabled. No authentication required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data from internal networks, or use the vulnerable server as a proxy for attacks against other systems.

🟠

Likely Case

Attackers scanning for internal services, accessing metadata services (like AWS IMDS), or performing port scanning of internal networks.

🟢

If Mitigated

Limited impact if network segmentation restricts outbound connections and internal services are properly secured.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires precise timing but tools exist to automate TOCTOU race conditions. No public exploit code found in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.9 or later

Vendor Advisory: https://support.fancyproductdesigner.com/support/discussions/topics/13000036024

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Fancy Product Designer. 4. Click 'Update Now' if available. 5. Alternatively, download version 6.4.9+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable AJAX endpoint

all

Remove or restrict access to the fpd_custom_uplod_file AJAX action

Add to theme's functions.php or custom plugin: add_filter('wp_ajax_nopriv_fpd_custom_uplod_file', '__return_false');
add_filter('wp_ajax_fpd_custom_uplod_file', '__return_false');

Web Application Firewall rule

all

Block requests to the vulnerable endpoint

WAF rule to block: POST requests containing 'action=fpd_custom_uplod_file'

🧯 If You Can't Patch

  • Disable the Fancy Product Designer plugin completely
  • Implement network-level restrictions to block outbound HTTP requests from the web server to internal networks

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Fancy Product Designer → Version. If version is 6.4.8 or lower, you are vulnerable.

Check Version:

wp plugin list --name=fancy-product-designer --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify plugin version is 6.4.9 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /wp-admin/admin-ajax.php with action=fpd_custom_uplod_file
  • Unusual outbound connections from web server to internal IPs or metadata services

Network Indicators:

  • Web server making HTTP requests to internal IP ranges (10.x, 172.16-31.x, 192.168.x)
  • Requests to cloud metadata endpoints (169.254.169.254)

SIEM Query:

source="web_server_logs" AND uri="/wp-admin/admin-ajax.php" AND post_data CONTAINS "fpd_custom_uplod_file"

🔗 References

📤 Share & Export