CVE-2025-13109

4.3 MEDIUM

📋 TL;DR

This vulnerability in the HUSKY – Products Filter Professional for WooCommerce WordPress plugin allows authenticated attackers with subscriber-level access or higher to manipulate saved search queries in any user's profile, including administrators. It affects all plugin versions up to 1.3.7.2 due to missing validation on user-controlled keys in the woof_add_query and woof_remove_query functions.

💻 Affected Systems

Products:
  • HUSKY – Products Filter Professional for WooCommerce WordPress plugin
Versions: All versions up to and including 1.3.7.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with WooCommerce and the vulnerable plugin enabled. Attackers need at least subscriber-level authenticated access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify administrator search queries to disrupt operations, plant malicious queries, or manipulate user preferences across the site.

🟠

Likely Case

Attackers modify saved searches of other users to cause confusion, disrupt user experience, or potentially redirect users through manipulated search results.

🟢

If Mitigated

With proper access controls and input validation, impact is limited to minor user preference manipulation within the plugin's search functionality.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once authenticated. The vulnerability is in publicly accessible plugin functions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.7.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3400527

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'HUSKY – Products Filter Professional for WooCommerce'. 4. Click 'Update Now' if available, or manually update to version 1.3.7.3+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the HUSKY Products Filter plugin until patched

wp plugin deactivate husky-woocommerce-product-filter-pro

Restrict user registration

all

Disable new user registration to prevent attacker account creation

wp option update users_can_register 0

🧯 If You Can't Patch

  • Remove plugin entirely if not essential for site functionality
  • Implement web application firewall rules to block requests to woof_add_query and woof_remove_query functions

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → HUSKY – Products Filter Professional for WooCommerce → Version. If version is 1.3.7.2 or lower, system is vulnerable.

Check Version:

wp plugin get husky-woocommerce-product-filter-pro --field=version

Verify Fix Applied:

Verify plugin version is 1.3.7.3 or higher in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=woof_add_query or action=woof_remove_query
  • Multiple saved search modifications from single user accounts
  • Search query modifications targeting administrator user IDs

Network Indicators:

  • HTTP requests containing woof_add_query or woof_remove_query parameters with manipulated user_id values

SIEM Query:

source="wordpress.log" AND ("woof_add_query" OR "woof_remove_query") AND user_id!="current_user_id"

🔗 References

📤 Share & Export