id: CVE-2021-24370 info: name: WordPress Fancy Product Designer <4.6.9 - Arbitrary File Upload author: pikpikcu severity: critical description: | WordPress Fancy Product Designer plugin before 4.6.9 is susceptible to an arbitrary file upload. An attacker can upload malicious files and execute code on the server, modify data, and/or gain full control over a compromised system without authentication. remediation: | Update WordPress Fancy Product Designer plugin to version 4.6.9 or later to fix the vulnerability. reference: - https://www.wordfence.com/blog/2021/06/critical-0-day-in-fancy-product-designer-under-active-attack/ - https://wpscan.com/vulnerability/82c52461-1fdc-41e4-9f51-f9dd84962b38 - https://seclists.org/fulldisclosure/2020/Nov/30 - https://nvd.nist.gov/vuln/detail/CVE-2021-24370 - https://www.secpod.com/blog/critical-zero-day-flaw-actively-exploited-in-wordpress-fancy-product-designer-plugin/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-24370 cwe-id: CWE-434 epss-score: 0.10577 epss-percentile: 0.94449 cpe: cpe:2.3:a:radykal:fancy_product_designer:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: radykal product: fancy_product_designer framework: wordpress google-query: inurl:“/wp-content/plugins/fancy-product-designer” tags: wordpress,wp,seclists,cve,wpscan,cve2021,rce,wp-plugin,fancyproduct http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/fancy-product-designer/inc/custom-image-handler.php" matchers-condition: and matchers: - type: word part: body words: - '{"error":"You need to define a directory' - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 490a00463044022045bb5683d1f983e22b37c714b4236f9c87f2fa199eb40caa3b8620dfd3cf40ea02205a7a9e12e607444d29423c9b5f82f6799444f1584dea35c9f5f92200151ace56:922c64590222798bb761d5b6d8e72950