Malicious File Inclusion Vulnerability in HUSKY – Products Filter for WooCommerce (formerly WOOF)
CVE-2024-32680
8.8HIGH
Key Information
- Vendor
- Pluginus
- Status
- Husky – Products Filter For WooCommerce (formerly Woof)
- Vendor
- CVE Published:
- 17 May 2024
Summary
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Control of Generation of Code ('Code Injection') vulnerability in PluginUS HUSKY – Products Filter for WooCommerce (formerly WOOF) allows Using Malicious Files, Code Inclusion.This issue affects HUSKY – Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.5.2.
Affected Version(s)
HUSKY – Products Filter for WooCommerce (formerly WOOF) <= 1.3.5.2
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database
Credit
Yudistira Arya (Patchstack Alliance)