Description
The Fancy Product Designer plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.4.8. This is due to a time-of-check/time-of-use (TOCTOU) race condition in the 'url' parameter of the fpd_custom_uplod_file AJAX action. The plugin validates the URL by calling getimagesize() first, then later retrieves the same URL using file_get_contents(). This makes it possible for unauthenticated attackers to exploit the timing gap to perform SSRF attacks by serving a valid image during validation, then changing the response to redirect to arbitrary internal or external URLs during the actual fetch.
Problem types
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Product status
* (semver)
Timeline
| 2025-11-19: | Vendor Notified |
| 2025-12-15: | Disclosed |
Credits
Muhammad Zeeshan
References
www.wordfence.com/...-5b75-4cbb-aedd-f318fddc7bf0?source=cve
support.fancyproductdesigner.com/...sions/topics/13000036024
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.