Vulnerabilities and security researches forwoocommerce-products-filter woocommerce-products-filter
Direction: ascendingJun 07, 2024
HUSKY – Products Filter for WooCommerce Professional # CVE-2018-8711
- CVE, Research URL
- Date
- Mar 15, 2018
- Research Description
- A local file inclusion issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The vulnerability is due to the lack of args/input validation on render_html before allowing it to be called by extract(), a PHP built-in function. Because of this, the supplied args/input can be used to overwrite the $pagepath variable, which then could lead to a local file inclusion attack.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
HUSKY – Products Filter for WooCommerce Professional # CVE-2021-25085
- CVE, Research URL
- Date
- Feb 01, 2022
- Research Description
- The WOOF WordPress plugin before 1.2.6.3 does not sanitise and escape the woof_redraw_elements before outputing back in an admin page, leading to a Reflected Cross-Site Scripting
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
HUSKY – Products Filter for WooCommerce Professional # CVE-2018-8710
- CVE, Research URL
- Date
- Mar 15, 2018
- Research Description
- A remote code execution issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The plugin implemented a page redraw AJAX function accessible to anyone without any authentication. WordPress shortcode markup in the "shortcode" parameters would be evaluated. Normally unauthenticated users can't evaluate shortcodes as they are often sensitive.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
HUSKY – Products Filter for WooCommerce Professional # CVE-2022-4489
- CVE, Research URL
- Date
- Feb 07, 2023
- Research Description
- The HUSKY WordPress plugin before 1.3.2 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
HUSKY – Products Filter for WooCommerce Professional # CVE-2023-50861
- CVE, Research URL
- Date
- Mar 15, 2024
- Research Description
- Cross-Site Request Forgery (CSRF) vulnerability in realmag777 HUSKY – Products Filter for WooCommerce (formerly WOOF).This issue affects HUSKY – Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.4.3.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
HUSKY – Products Filter for WooCommerce Professional # CVE-2024-30462
- CVE, Research URL
- Date
- Mar 29, 2024
- Research Description
- Cross-Site Request Forgery (CSRF) vulnerability in realmag777 HUSKY – Products Filter for WooCommerce (formerly WOOF).This issue affects HUSKY – Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.5.1.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
HUSKY – Products Filter for WooCommerce Professional # CVE-2023-40010
- CVE, Research URL
- Date
- Dec 20, 2023
- Research Description
- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in realmag777 HUSKY – Products Filter for WooCommerce Professional.This issue affects HUSKY – Products Filter for WooCommerce Professional: from n/a through 1.3.4.2.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
HUSKY – Products Filter for WooCommerce Professional # CVE-2024-5039
- CVE, Research URL
- Date
- May 29, 2024
- Research Description
- The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.3.5.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
HUSKY – Products Filter for WooCommerce Professional # CVE-2024-1796
- CVE, Research URL
- Date
- Mar 15, 2024
- Research Description
- The HUSKY – Products Filter for WooCommerce Professional plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'woof' shortcode in all versions up to, and including, 1.3.5.1 due to insufficient input sanitization and output escaping on user supplied attributes such as 'swoof_slug'. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
HUSKY – Products Filter for WooCommerce Professional # CVE-2024-1795
- CVE, Research URL
- Date
- Mar 15, 2024
- Research Description
- The HUSKY – Products Filter for WooCommerce Professional plugin for WordPress is vulnerable to SQL Injection via the 'name' parameter in the woof shortcode in all versions up to, and including, 1.3.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
HUSKY – Products Filter for WooCommerce Professional # CVE-2024-3061
- CVE, Research URL
- Date
- Mar 29, 2024
- Research Description
- The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.5.2 via the 'type' parameter. This makes it possible for authenticated attackers, with administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
HUSKY – Products Filter for WooCommerce Professional # CVE-2024-32680
- CVE, Research URL
- Date
- May 17, 2024
- Research Description
- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Control of Generation of Code ('Code Injection') vulnerability in PluginUS HUSKY – Products Filter for WooCommerce (formerly WOOF) allows Using Malicious Files, Code Inclusion.This issue affects HUSKY – Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.5.2.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jun 10, 2024
HUSKY – Products Filter for WooCommerce Professional # CVE-2023-40334
- CVE, Research URL
- Date
- Dec 13, 2024
- Research Description
- Missing Authorization vulnerability in realmag777 HUSKY allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects HUSKY: from n/a through 1.3.4.2.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jul 17, 2024
HUSKY – Products Filter for WooCommerce Professional # CVE-2024-6457
- CVE, Research URL
- Date
- Jul 16, 2024
- Research Description
- The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the ‘woof_author’ parameter in all versions up to, and including, 1.3.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Aug 12, 2024
HUSKY – Products Filter for WooCommerce Professional # CVE-2024-43121
- CVE, Research URL
- Date
- Aug 13, 2024
- Research Description
- Improper Privilege Management vulnerability in realmag777 HUSKY allows Privilege Escalation.This issue affects HUSKY: from n/a through 1.3.6.1.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Sep 25, 2024
HUSKY – Products Filter for WooCommerce Professional # CVE-2024-7491
- CVE, Research URL
- Date
- Sep 25, 2024
- Research Description
- The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.6.1 via the woof_messenger_remove_subscr AJAX action due to missing validation on the 'key' user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to unsubscribe users from a product notification sign-ups, if they can successfully obtain or brute force the key value for users who signed up to receive notifications. This vulnerability requires the plugin's Products Messenger extension to be enabled.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Nov 20, 2024
HUSKY – Products Filter for WooCommerce Professional # CVE-2024-11400
- CVE, Research URL
- Date
- Nov 20, 2024
- Research Description
- The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the really_curr_tax parameter in all versions up to, and including, 1.3.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Mar 12, 2025
HUSKY – Products Filter for WooCommerce Professional # CVE-2025-1661
- CVE, Research URL
- Date
- Mar 11, 2025
- Research Description
- The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Apr 02, 2025
HUSKY – Products Filter for WooCommerce Professional # CVE-2025-26890
- CVE, Research URL
- Date
- Mar 28, 2025
- Research Description
- Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PluginUs.Net HUSKY allows PHP Local File Inclusion.This issue affects HUSKY: from n/a through 1.3.6.4.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable