Description
The Fancy Product Designer plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.4.8. This is due to a time-of-check/time-of-use (TOCTOU) race condition in the 'url' parameter of the fpd_custom_uplod_file AJAX action. The plugin validates the URL by calling getimagesize() first, then later retrieves the same URL using file_get_contents(). This makes it possible for unauthenticated attackers to exploit the timing gap to perform SSRF attacks by serving a valid image during validation, then changing the response to redirect to arbitrary internal or external URLs during the actual fetch.
INFO
Published Date :
2025-12-16T08:20:24.492Z
Last Modified :
2025-12-16T08:20:24.492Z
Source :
Wordfence
AFFECTED PRODUCTS
The following products are affected by CVE-2025-13231 vulnerability.
| Vendors | Products |
|---|---|
| Radykal |
|
| Wordpress |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-13231.