一、 漏洞 CVE-2025-1661 基础信息
漏洞信息
                                        # HUSKY 产品筛选插件 <=1.3.6.5 LFI漏洞

## 漏洞概述
HUSKY – Products Filter Professional for WooCommerce 插件存在本地文件包含漏洞,攻击者可以通过该漏洞读取和执行服务器上的任意文件,进而执行任意 PHP 代码。

## 影响版本
所有版本,包括 1.3.6.5 及以下版本

## 漏洞细节
该漏洞存在于 `woof_text_search` AJAX 动作的 `template` 参数中,未认证的攻击者可以利用该参数包含并执行服务器上的任意文件。

## 影响
攻击者可以利用此漏洞绕过访问控制,获取敏感数据,或者在可以上传图片和其他“安全”文件类型的环境中执行任意代码。
                                        
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
HUSKY – Products Filter Professional for WooCommerce <= 1.3.6.5 - Unauthenticated Local File Inclusion
来源:美国国家漏洞数据库 NVD
漏洞描述信息
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
来源:美国国家漏洞数据库 NVD
漏洞类别
对路径名的限制不恰当(路径遍历)
来源:美国国家漏洞数据库 NVD
漏洞标题
WordPress plugin HUSKY Products Filter Professional for WooCommerce 路径遍历漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin HUSKY Products Filter Professional for WooCommerce 1.3.6.5及之前版本存在路径遍历漏洞,该漏洞源于通过woof_text_search AJAX操作的template参数
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
路径遍历
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2025-1661 的公开POC
# POC 描述 源链接 神龙链接
1 HUSKY – Products Filter Professional for WooCommerce < 1.3.6.6 - Local File Inclusion PoC https://github.com/gbrsh/CVE-2025-1661 POC详情
2 HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion (LFI) https://github.com/MuhammadWaseem29/CVE-2025-1661 POC详情
3 The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-1661.yaml POC详情
4 HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion (LFI) https://github.com/shahwarshah/CVE-2025-1661 POC详情
三、漏洞 CVE-2025-1661 的情报信息
四、漏洞 CVE-2025-1661 的评论

暂无评论


发表评论