Premium WordPress plugin Fancy Product Designer from Radykal is susceptible to 2 crucial severity flaws that stay unfixed within the present newest model.
With greater than 20,000 gross sales, the plugin permits customization of product designs (e.g. clothes, mugs, telephone circumstances) on WooCommerce websites by altering colours, remodeling textual content, or modifying the scale.
Whereas analyzing the plugin, Patchstack’s Rafie Muhammad found on March 17, 2024, that the plugin was susceptible to the next two crucial flaws:
- CVE-2024-51919 (CVSS rating: 9.0): Unauthenticated arbitrary file add vulnerability brought on by an insecure implementation of file add features ‘save_remote_file’ and ‘fpd_admin_copy_file,’ that don’t correctly validate or prohibit file sorts. Attackers can exploit this by supplying a distant URL to add malicious recordsdata, reaching distant code execution (RCE).
- CVE-2024-51818 (CVSS rating: 9.3): Unauthenticated SQL injection flaw brought on by the improper sanitization of consumer inputs resulting from using the inadequate ‘strip_tags.’ Person-supplied enter is instantly built-in into database queries with out correct validation, doubtlessly resulting in database compromise, information retrieval, modification, and deletion.
Regardless of Patchstack notifying the seller of the problems a day after discovering them, Radykal by no means answered again.
On January 6, Patchstack added the failings to its database, and at present revealed a weblog publish to warn customers and lift consciousness in regards to the dangers.
Even after releasing 20 new variations, with the newest being 6.4.3, launched 2 months in the past, the 2 crucial safety points stay unpatched, Muhammad says.
Patchstack’s writeup offers adequate technical data for attackers to create exploits and begin concentrating on net shops that use Radykal’s Fancy Product Designer plugin.
As a basic suggestion, admins ought to forestall arbitrary file uploads by creating an allowed checklist with protected file extensions. Moreover, Patchstack recommends to guard towards SQL injection by sanitizing the consumer’s enter for a question by doing a protected escape and format.
BleepingComputer has contacted Radycal to ask in the event that they plan on releasing a safety replace quickly, however a remark wasn’t instantly accessible.