CVE-2023-40010

9.3 CRITICAL

📋 TL;DR

This SQL injection vulnerability in the HUSKY – Products Filter for WooCommerce Professional WordPress plugin allows attackers to execute arbitrary SQL commands on affected WordPress sites. All WordPress installations using vulnerable versions of this plugin are affected, potentially compromising the entire WordPress database.

💻 Affected Systems

Products:
  • HUSKY – Products Filter for WooCommerce Professional WordPress plugin
Versions: All versions up to and including 1.3.4.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce installed and the vulnerable plugin activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, privilege escalation, site defacement, or full system takeover via SQL injection to RCE chaining.

🟠

Likely Case

Unauthorized data access, modification, or deletion of WooCommerce product data, customer information, and WordPress user credentials.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database user privilege restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities in WordPress plugins are frequently exploited in the wild, especially when public PoCs exist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.4.3 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/woocommerce-products-filter/wordpress-husky-plugin-1-3-4-2-sql-injection-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'HUSKY – Products Filter for WooCommerce Professional'. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 1.3.4.3+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the HUSKY plugin until patched

wp plugin deactivate woocommerce-products-filter

Web Application Firewall rule

all

Block SQL injection patterns targeting the vulnerable plugin endpoints

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user inputs
  • Apply principle of least privilege to database user accounts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → HUSKY – Products Filter for WooCommerce Professional → Version number

Check Version:

wp plugin get woocommerce-products-filter --field=version

Verify Fix Applied:

Confirm plugin version is 1.3.4.3 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in WordPress or database logs
  • Multiple failed login attempts from single IP
  • Unexpected database errors

Network Indicators:

  • HTTP requests with SQL injection payloads to /wp-content/plugins/woocommerce-products-filter/ endpoints

SIEM Query:

source="wordpress.log" AND "woocommerce-products-filter" AND ("SQL" OR "database error" OR "syntax error")

🔗 References

📤 Share & Export