HTTP: WordPress Husky Products Filter Plugin template Local File Inclusion

This signature detects attempts to exploit a known vulnerability against WordPress. A successful attack can lead to local file inclusion.

Extended Description

The HUSKY Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other safe file types can be uploaded and included.

Affected Products

Pluginus husky_-_products_filter_professional_for_woocommerce

Short Name
HTTP:CTS:WORDPRESS-FILE-INCL
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2025-1661 File Filter Husky Inclusion Local Plugin Products WordPress template
Release Date
06/12/2025
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3816
False Positive
Unknown
Vendors

Pluginus

Found a potential security threat?