CVE-2025-1661
CRITICAL EXPLOITED NUCLEIPluginus Husky - Products Filter Prof... - Path Traversal
Title source: ruleDescription
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Exploits (4)
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/WooCommerce_CVE-2025-1661-LFI.py
nomisec
WORKING POC
by MuhammadWaseem29 · infoleak
https://github.com/MuhammadWaseem29/CVE-2025-1661
Nuclei Templates (1)
HUSKY – Products Filter Professional for WooCommerce <= 1.3.6.5 - Unauthenticated Local File Inclusion
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
References (4)
Scores
CVSS v3
9.8
EPSS
0.9145
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2025-03-10
Classification
CWE
CWE-22
Status
published
Affected Products (1)
pluginus/husky_-_products_filter_professional_for_woocommerce
< 1.3.6.6
Timeline
Published
Mar 11, 2025
Tracked Since
Feb 18, 2026