First published: Tue Mar 11 2025(Updated: )
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
HUSKY Products Filter Professional for WooCommerce | <=1.3.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1661 is classified as a medium severity vulnerability due to the potential for unauthorized local file inclusion.
To fix CVE-2025-1661, update the HUSKY Products Filter Professional for WooCommerce plugin to version 1.3.6.6 or later.
CVE-2025-1661 affects all versions of the HUSKY Products Filter Professional for WooCommerce plugin up to and including version 1.3.6.5.
Yes, CVE-2025-1661 can be exploited by unauthenticated attackers to perform local file inclusion attacks.
The 'template' parameter of the woof_text_search AJAX action is responsible for the vulnerability in CVE-2025-1661.