Wordfence Threat Intelligence team discovered a critical file upload vulnerability being actively exploited in Fancy Product Designer, a WordPress plugin installed on over 17,000 sites

Fancy Product Designer is a WordPress plugin that offers the ability for customers to upload images and PDF files to be added to products.

Unfortunately, while the plugin had some checks in place to prevent malicious files from being uploaded, these checks were insufficient and could easily be bypassed, allowing attackers to upload executable PHP files to any site with the plugin installed. This effectively made it possible for an attacker to achieve Remote Code Execution on an impacted site, allowing full site takeover.

Indicators Of Compromise

In most cases, a successful attack results in a file with a unique ID and a PHP extension, which will appear in a subfolder of either
with the date, the file was uploaded. For instance:




The majority of attacks against this vulnerability are coming from the following IP addresses:

Wordfence Threat Intelligence team indicates that this vulnerability is likely not being attacked on a large scale but has been exploited since at least May 16, 2021.

Fraudster Sentenced To Prison For Long-Running Phone Unlocking Scheme That Defrauded AT&T