Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-1661 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Unauthenticated Local File Inclusion (LFI) via `template` param in `woof_text_search` AJAX action.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-22 (Path Traversal). The plugin fails to sanitize the `template` parameter, allowing directory traversal sequences (`../`) to access files outside the intended directory.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin **HUSKY – Products Filter Professional for WooCommerce**. πŸ“‰ **Versions**: **1.3.6.5 and earlier**. Vendor: **realmag777**.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Unauthenticated users can include & execute arbitrary PHP files. πŸ“‚ **Impact**: Full server compromise, data exfiltration, and bypassing security controls. CVSS Score is **Critical (9.8)**.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. No authentication (PR:N) or user interaction (UI:N) required. Exploitation is remote and straightforward (AV:N, AC:L).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Public Exploits**: **YES**. Multiple PoCs are available on GitHub (e.g., gbrsh, MuhammadWaseem29) and Nuclei templates. Wild exploitation is highly likely.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for the plugin version < 1.3.6.6. Use Nuclei templates for CVE-2025-1661. Check if `woof_text_search` AJAX endpoint accepts unsanitized `template` parameters.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: **YES**. Updated to version **1.3.6.6** fixes the vulnerability. Check WordPress plugin repository for the latest release.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Disable the plugin immediately. If essential, restrict access to `wp-admin` and use a WAF to block `../` sequences in AJAX requests. Monitor logs for LFI attempts.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. CVSS 9.8 + Public PoCs + Unauthenticated. Patch immediately to prevent server takeover. Do not delay!