First published: Wed Mar 14 2018(Updated: )
A local file inclusion issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The vulnerability is due to the lack of args/input validation on render_html before allowing it to be called by extract(), a PHP built-in function. Because of this, the supplied args/input can be used to overwrite the $pagepath variable, which then could lead to a local file inclusion attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HUSKY – Products Filter for WooCommerce | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8711 has a medium severity level due to its potential for local file inclusion risks.
To fix CVE-2018-8711, update the WooCommerce Products Filter plugin to version 2.2.0 or later.
Exploiting CVE-2018-8711 can lead to unauthorized access to files on the server through local file inclusion.
Anyone using versions of the WooCommerce Products Filter plugin prior to 2.2.0 on WordPress is affected by CVE-2018-8711.
There is no effective mitigation for CVE-2018-8711 other than upgrading to the latest version of the plugin.