CVE-2025-13110
📋 TL;DR
This vulnerability in the HUSKY – Products Filter Professional for WooCommerce WordPress plugin allows authenticated attackers with subscriber-level access or higher to create product messenger subscriptions on behalf of any user, including administrators. It affects all plugin versions up to 1.3.7.3 due to missing validation on user-controlled input in the 'woof_add_subscr' function.
💻 Affected Systems
- HUSKY – Products Filter Professional for WooCommerce WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could create unwanted subscriptions for administrators, potentially leading to spam, phishing attempts, or disruption of legitimate user notifications.
Likely Case
Attackers create product messenger subscriptions for other users, causing annoyance and potential confusion but not direct system compromise.
If Mitigated
With proper access controls and input validation, the impact is limited to minor user inconvenience.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward due to missing input validation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.7.4 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3415428/woocommerce-products-filter
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'HUSKY – Products Filter Professional for WooCommerce'. 4. Click 'Update Now' if available, or manually update to version 1.3.7.4+. 5. Verify the plugin is active and functioning.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the plugin until patched
wp plugin deactivate woocommerce-products-filter
Restrict user registration
allLimit new user registrations to reduce attack surface
🧯 If You Can't Patch
- Remove subscriber-level access for untrusted users
- Implement web application firewall rules to block suspicious subscription requests
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin under Plugins > Installed Plugins
Check Version:
wp plugin get woocommerce-products-filter --field=version
Verify Fix Applied:
Confirm plugin version is 1.3.7.4 or higher
📡 Detection & Monitoring
Log Indicators:
- Unusual subscription creation patterns
- Multiple subscription requests from single user accounts
Network Indicators:
- POST requests to woof_add_subscr function with manipulated user IDs
SIEM Query:
source="wordpress.log" AND "woof_add_subscr" AND (user_id != current_user)