CVE-2024-1795

8.8 HIGH

📋 TL;DR

This SQL injection vulnerability in the HUSKY – Products Filter for WooCommerce Professional WordPress plugin allows authenticated attackers with contributor-level access or higher to inject malicious SQL queries via the 'name' parameter. This can lead to unauthorized extraction of sensitive database information. All WordPress sites using this plugin up to version 1.3.5.2 are affected.

💻 Affected Systems

Products:
  • HUSKY – Products Filter for WooCommerce Professional WordPress plugin
Versions: All versions up to and including 1.3.5.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the vulnerable plugin installed. Contributor-level authentication is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including extraction of user credentials, payment information, and administrative access leading to site takeover.

🟠

Likely Case

Extraction of sensitive user data, plugin/theme configurations, and potentially privilege escalation.

🟢

If Mitigated

Limited data exposure if proper database segmentation and least privilege principles are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses simple SQL injection techniques. The vulnerability is well-documented in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.5.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3051027%40woocommerce-products-filter&new=3051027%40woocommerce-products-filter&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'HUSKY – Products Filter for WooCommerce Professional'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.3.5.3+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable shortcode

all

Remove or disable the woof shortcode from posts/pages to prevent exploitation

Search WordPress content for [woof] shortcode usage and remove

Restrict contributor access

all

Temporarily elevate contributor role requirements or limit contributor accounts

Use WordPress role management plugins to restrict contributor capabilities

🧯 If You Can't Patch

  • Immediately disable the HUSKY plugin entirely
  • Implement web application firewall (WAF) rules to block SQL injection patterns targeting the 'name' parameter

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for HUSKY – Products Filter for WooCommerce Professional version ≤1.3.5.2

Check Version:

wp plugin list --name='woocommerce-products-filter' --field=version (if WP-CLI installed)

Verify Fix Applied:

Confirm plugin version is 1.3.5.3 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in WordPress/database logs containing 'woof' or 'name' parameter manipulation
  • Multiple failed login attempts followed by contributor-level access

Network Indicators:

  • POST requests to WordPress pages containing 'name' parameter with SQL injection patterns

SIEM Query:

source="wordpress.log" AND "[woof]" AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE" OR "UPDATE" OR "--" OR "' OR '1'='1")

🔗 References

📤 Share & Export