Some VPN setups only tunnel IPv4 traffic. If your normal network also provides IPv6, websites can still see an IPv6 route that belongs to your home ISP or mobile carrier. Seeing IPv6 on its own is not always a leak. The real question is whether that IPv6 route still belongs to your original network after the VPN connects.
Important nuance: if your VPN provider supports native IPv6 well, seeing an IPv6 result is not automatically a failure. The failure is when the IPv6 result still maps back to your normal ISP or your expected non-VPN route.
This is why a simple IP change check is not enough. You want the visible route, DNS behavior, and browser behavior to tell a consistent story after the VPN connects.
If you need a broader privacy check after fixing IPv6 behavior, continue into the full VPN verification checklist.