Vulnerability Description
The Fancy Product Designer WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the ID parameter found in the ~/inc/api/class-view.php file which allows attackers with administrative level permissions to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 4.7.4.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Radykal | Fancy Product Designer | < 4.7.5 |
Related Weaknesses (CWE)
References
- https://support.fancyproductdesigner.com/support/discussions/topics/13000031264Release NotesVendor Advisory
- https://www.wordfence.com/vulnerability-advisories/#CVE-2021-4134ExploitThird Party Advisory
- https://support.fancyproductdesigner.com/support/discussions/topics/13000031264Release NotesVendor Advisory
- https://www.wordfence.com/vulnerability-advisories/#CVE-2021-4134ExploitThird Party Advisory
FAQ
What is CVE-2021-4134?
CVE-2021-4134 is a vulnerability with a CVSS score of 7.2 (HIGH). The Fancy Product Designer WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the ID parameter found in the ~/inc/api/class-view.php file which allows...
How severe is CVE-2021-4134?
CVE-2021-4134 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-4134?
Check the references section above for vendor advisories and patch information. Affected products include: Radykal Fancy Product Designer.