The Fancy Product Designer plugin for WordPress, developed by Radykal, has been found to have two critical security vulnerabilities, which remain unpatched despite being identified months ago. The plugin, used by over 20,000 WooCommerce sites, allows users to customize product designs. The flaws were discovered by Patchstack’s Rafie Muhammad in March 2024 and include a remote code execution vulnerability and an unauthenticated SQL injection issue. These flaws could potentially lead to attackers compromising websites that use the plugin.
The first vulnerability, CVE-2024-51919, involves an unauthenticated arbitrary file upload issue caused by insecure implementation of file upload functions within the plugin. Attackers can exploit this flaw by providing a remote URL to upload malicious files, which could then lead to remote code execution. The second vulnerability, CVE-2024-51818, is a severe SQL injection flaw. This issue arises from improper sanitization of user inputs, allowing attackers to manipulate database queries and gain unauthorized access to data, including modifications or deletions.
Patchstack notified Radykal about these vulnerabilities the day after they were discovered, but no response was received from the vendor. Even after 20 new versions of the plugin were released, including version 6.4.3 two months ago, the security flaws remain unpatched. Patchstack has added these issues to its vulnerability database and published a blog post to warn users of the potential risks. This has raised concerns about the plugin’s continued security and the impact on websites using it.
In response to the vulnerabilities, Patchstack recommends several security measures for administrators. These include creating an allowed list of file extensions to prevent arbitrary file uploads and properly sanitizing user inputs in SQL queries to protect against injection attacks. Despite attempts to reach out to Radykal for a response, there has been no immediate comment regarding whether a fix will be released. Until addressed, users of the plugin remain at risk of exploitation.