CVE-2025-1661

CRITICAL EXPLOITED NUCLEI

Pluginus Husky - Products Filter Prof... - Path Traversal

Title source: rule

Description

The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

Exploits (4)

github WORKING POC 40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/WooCommerce_CVE-2025-1661-LFI.py
nomisec WORKING POC 1 stars
by gbrsh · remote
https://github.com/gbrsh/CVE-2025-1661
nomisec WORKING POC
by MuhammadWaseem29 · infoleak
https://github.com/MuhammadWaseem29/CVE-2025-1661
nomisec WRITEUP
by shahwarshah · poc
https://github.com/shahwarshah/CVE-2025-1661

Nuclei Templates (1)

HUSKY – Products Filter Professional for WooCommerce <= 1.3.6.5 - Unauthenticated Local File Inclusion
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch

Scores

CVSS v3 9.8
EPSS 0.9145
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2025-03-10

Classification

CWE
CWE-22
Status published

Affected Products (1)

pluginus/husky_-_products_filter_professional_for_woocommerce < 1.3.6.6

Timeline

Published Mar 11, 2025
Tracked Since Feb 18, 2026