cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forwoocommerce-products-filter woocommerce-products-filter

Direction: ascending
Jun 07, 2024

HUSKY – Products Filter for WooCommerce Professional # CVE-2018-8711

CVE, Research URL

CVE-2018-8711

Date
Mar 15, 2018
Research Description
A local file inclusion issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The vulnerability is due to the lack of args/input validation on render_html before allowing it to be called by extract(), a PHP built-in function. Because of this, the supplied args/input can be used to overwrite the $pagepath variable, which then could lead to a local file inclusion attack.
Affected versions
Min -, max -.
Status
vulnerable

HUSKY – Products Filter for WooCommerce Professional # CVE-2021-25085

CVE, Research URL

CVE-2021-25085

Date
Feb 01, 2022
Research Description
The WOOF WordPress plugin before 1.2.6.3 does not sanitise and escape the woof_redraw_elements before outputing back in an admin page, leading to a Reflected Cross-Site Scripting
Affected versions
Min -, max -.
Status
vulnerable

HUSKY – Products Filter for WooCommerce Professional # CVE-2018-8710

CVE, Research URL

CVE-2018-8710

Date
Mar 15, 2018
Research Description
A remote code execution issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The plugin implemented a page redraw AJAX function accessible to anyone without any authentication. WordPress shortcode markup in the "shortcode" parameters would be evaluated. Normally unauthenticated users can't evaluate shortcodes as they are often sensitive.
Affected versions
Min -, max -.
Status
vulnerable

HUSKY – Products Filter for WooCommerce Professional # CVE-2022-4489

CVE, Research URL

CVE-2022-4489

Date
Feb 07, 2023
Research Description
The HUSKY WordPress plugin before 1.3.2 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present.
Affected versions
Min -, max -.
Status
vulnerable

HUSKY – Products Filter for WooCommerce Professional # CVE-2023-50861

CVE, Research URL

CVE-2023-50861

Date
Mar 15, 2024
Research Description
Cross-Site Request Forgery (CSRF) vulnerability in realmag777 HUSKY – Products Filter for WooCommerce (formerly WOOF).This issue affects HUSKY – Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.4.3.
Affected versions
Min -, max -.
Status
vulnerable

HUSKY – Products Filter for WooCommerce Professional # CVE-2024-30462

CVE, Research URL

CVE-2024-30462

Date
Mar 29, 2024
Research Description
Cross-Site Request Forgery (CSRF) vulnerability in realmag777 HUSKY – Products Filter for WooCommerce (formerly WOOF).This issue affects HUSKY – Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.5.1.
Affected versions
Min -, max -.
Status
vulnerable

HUSKY – Products Filter for WooCommerce Professional # CVE-2023-40010

CVE, Research URL

CVE-2023-40010

Date
Dec 20, 2023
Research Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in realmag777 HUSKY – Products Filter for WooCommerce Professional.This issue affects HUSKY – Products Filter for WooCommerce Professional: from n/a through 1.3.4.2.
Affected versions
Min -, max -.
Status
vulnerable

HUSKY – Products Filter for WooCommerce Professional # CVE-2024-5039

CVE, Research URL

CVE-2024-5039

Date
May 29, 2024
Research Description
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.3.5.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable

HUSKY – Products Filter for WooCommerce Professional # CVE-2024-1796

CVE, Research URL

CVE-2024-1796

Date
Mar 15, 2024
Research Description
The HUSKY – Products Filter for WooCommerce Professional plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'woof' shortcode in all versions up to, and including, 1.3.5.1 due to insufficient input sanitization and output escaping on user supplied attributes such as 'swoof_slug'. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable

HUSKY – Products Filter for WooCommerce Professional # CVE-2024-1795

CVE, Research URL

CVE-2024-1795

Date
Mar 15, 2024
Research Description
The HUSKY – Products Filter for WooCommerce Professional plugin for WordPress is vulnerable to SQL Injection via the 'name' parameter in the woof shortcode in all versions up to, and including, 1.3.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
Min -, max -.
Status
vulnerable

HUSKY – Products Filter for WooCommerce Professional # CVE-2024-3061

CVE, Research URL

CVE-2024-3061

Date
Mar 29, 2024
Research Description
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.5.2 via the 'type' parameter. This makes it possible for authenticated attackers, with administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Affected versions
Min -, max -.
Status
vulnerable

HUSKY – Products Filter for WooCommerce Professional # CVE-2024-32680

CVE, Research URL

CVE-2024-32680

Date
May 17, 2024
Research Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Control of Generation of Code ('Code Injection') vulnerability in PluginUS HUSKY – Products Filter for WooCommerce (formerly WOOF) allows Using Malicious Files, Code Inclusion.This issue affects HUSKY – Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.5.2.
Affected versions
Min -, max -.
Status
vulnerable
Jun 10, 2024

HUSKY – Products Filter for WooCommerce Professional # CVE-2023-40334

CVE, Research URL

CVE-2023-40334

Date
Dec 13, 2024
Research Description
Missing Authorization vulnerability in realmag777 HUSKY allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects HUSKY: from n/a through 1.3.4.2.
Affected versions
Min -, max -.
Status
vulnerable
Jul 17, 2024

HUSKY – Products Filter for WooCommerce Professional # CVE-2024-6457

CVE, Research URL

CVE-2024-6457

Date
Jul 16, 2024
Research Description
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the ‘woof_author’ parameter in all versions up to, and including, 1.3.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
Min -, max -.
Status
vulnerable
Aug 12, 2024

HUSKY – Products Filter for WooCommerce Professional # CVE-2024-43121

CVE, Research URL

CVE-2024-43121

Date
Aug 13, 2024
Research Description
Improper Privilege Management vulnerability in realmag777 HUSKY allows Privilege Escalation.This issue affects HUSKY: from n/a through 1.3.6.1.
Affected versions
Min -, max -.
Status
vulnerable
Sep 25, 2024

HUSKY – Products Filter for WooCommerce Professional # CVE-2024-7491

CVE, Research URL

CVE-2024-7491

Date
Sep 25, 2024
Research Description
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.6.1 via the woof_messenger_remove_subscr AJAX action due to missing validation on the 'key' user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to unsubscribe users from a product notification sign-ups, if they can successfully obtain or brute force the key value for users who signed up to receive notifications. This vulnerability requires the plugin's Products Messenger extension to be enabled.
Affected versions
Min -, max -.
Status
vulnerable
Nov 20, 2024

HUSKY – Products Filter for WooCommerce Professional # CVE-2024-11400

CVE, Research URL

CVE-2024-11400

Date
Nov 20, 2024
Research Description
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the really_curr_tax parameter in all versions up to, and including, 1.3.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
Min -, max -.
Status
vulnerable
Mar 12, 2025

HUSKY – Products Filter for WooCommerce Professional # CVE-2025-1661

CVE, Research URL

CVE-2025-1661

Date
Mar 11, 2025
Research Description
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Affected versions
Min -, max -.
Status
vulnerable
Apr 02, 2025

HUSKY – Products Filter for WooCommerce Professional # CVE-2025-26890

CVE, Research URL

CVE-2025-26890

Date
Mar 28, 2025
Research Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PluginUs.Net HUSKY allows PHP Local File Inclusion.This issue affects HUSKY: from n/a through 1.3.6.4.
Affected versions
Min -, max -.
Status
vulnerable