First published: Fri May 17 2024(Updated: )
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Control of Generation of Code ('Code Injection') vulnerability in PluginUS HUSKY – Products Filter for WooCommerce (formerly WOOF) allows Using Malicious Files, Code Inclusion.This issue affects HUSKY – Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.5.2.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
<1.3.5.3 | ||
HUSKY – Products Filter for WooCommerce | <=1.3.5.2 | |
WordPress | <=1.3.5.2 |
Update to 1.3.5.3 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32680 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2024-32680, update the PluginUS HUSKY – Products Filter for WooCommerce to version 1.3.5.3 or higher immediately.
CVE-2024-32680 exploits improper limitation of pathname and improper control of code generation, allowing path traversal and code injection.
CVE-2024-32680 affects PluginUS HUSKY – Products Filter for WooCommerce versions up to and including 1.3.5.2.
The potential impacts of CVE-2024-32680 include unauthorized file access, code execution, and complete system compromise.