Vulnerability Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Control of Generation of Code ('Code Injection') vulnerability in PluginUS HUSKY – Products Filter for WooCommerce (formerly WOOF) allows Using Malicious Files, Code Inclusion.This issue affects HUSKY – Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.5.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pluginus | Husky - Products Filter Professional For Woocommerce | < 1.3.5.3 |
Related Weaknesses (CWE)
References
- https://patchstack.com/database/vulnerability/woocommerce-products-filter/wordprThird Party Advisory
- https://patchstack.com/database/vulnerability/woocommerce-products-filter/wordprThird Party Advisory
FAQ
What is CVE-2024-32680?
CVE-2024-32680 is a vulnerability with a CVSS score of 8.8 (HIGH). Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Control of Generation of Code ('Code Injection') vulnerability in PluginUS HUSKY – Products Filter for WooComme...
How severe is CVE-2024-32680?
CVE-2024-32680 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-32680?
Check the references section above for vendor advisories and patch information. Affected products include: Pluginus Husky - Products Filter Professional For Woocommerce.