# HUSKY 产品筛选插件 <=1.3.6.5 LFI漏洞
## 漏洞概述
HUSKY – Products Filter Professional for WooCommerce 插件存在本地文件包含漏洞,攻击者可以通过该漏洞读取和执行服务器上的任意文件,进而执行任意 PHP 代码。
## 影响版本
所有版本,包括 1.3.6.5 及以下版本
## 漏洞细节
该漏洞存在于 `woof_text_search` AJAX 动作的 `template` 参数中,未认证的攻击者可以利用该参数包含并执行服务器上的任意文件。
## 影响
攻击者可以利用此漏洞绕过访问控制,获取敏感数据,或者在可以上传图片和其他“安全”文件类型的环境中执行任意代码。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | HUSKY – Products Filter Professional for WooCommerce < 1.3.6.6 - Local File Inclusion PoC | https://github.com/gbrsh/CVE-2025-1661 | POC详情 |
2 | HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion (LFI) | https://github.com/MuhammadWaseem29/CVE-2025-1661 | POC详情 |
3 | The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-1661.yaml | POC详情 |
4 | HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion (LFI) | https://github.com/shahwarshah/CVE-2025-1661 | POC详情 |
暂无评论