CVE-2025-32585

7.5 HIGH

📋 TL;DR

This CVE describes a path traversal vulnerability in the Trusty Plugins Shop Products Filter WordPress plugin that allows attackers to perform local file inclusion (LFI) by manipulating file paths. The vulnerability affects WordPress sites using this plugin, potentially allowing attackers to read sensitive files on the server. All versions up to 1.2 are vulnerable.

💻 Affected Systems

Products:
  • Trusty Plugins Shop Products Filter WordPress Plugin
Versions: n/a through 1.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin active. The plugin must be installed and enabled for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive server files like /etc/passwd, wp-config.php, or other configuration files, potentially leading to full system compromise if combined with other vulnerabilities.

🟠

Likely Case

Attackers will read WordPress configuration files to extract database credentials, then use those credentials to access or modify the database, potentially taking over the WordPress site.

🟢

If Mitigated

With proper file permissions and web server restrictions, attackers may only be able to read non-sensitive files or receive error messages.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is publicly documented with technical details available. Path traversal to LFI is a well-known attack pattern with many existing tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/trusty-woo-products-filter/vulnerability/wordpress-shop-products-filter-plugin-1-2-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Shop Products Filter' plugin. 4. Click 'Update Now' if update is available. 5. If no update is available, deactivate and delete the plugin immediately.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Deactivate the Shop Products Filter plugin to prevent exploitation

wp plugin deactivate shop-products-filter

Restrict file access via .htaccess

linux

Add rules to prevent directory traversal attempts

RewriteCond %{REQUEST_URI} \.\. [NC]
RewriteRule .* - [F,L]

🧯 If You Can't Patch

  • Remove the Shop Products Filter plugin completely from your WordPress installation
  • Implement web application firewall (WAF) rules to block path traversal patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Shop Products Filter' version 1.2 or earlier

Check Version:

wp plugin get shop-products-filter --field=version

Verify Fix Applied:

Verify plugin version is 1.3 or later, or confirm plugin is not installed

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '..' or '../' patterns
  • Requests to unexpected PHP files in plugin directories
  • Failed attempts to access sensitive system files

Network Indicators:

  • Unusual file path patterns in HTTP requests to WordPress site
  • Requests to plugin files with unexpected parameters

SIEM Query:

source="web_server_logs" AND (uri="*..*" OR uri="*../*") AND uri="*shop-products-filter*"

🔗 References

📤 Share & Export