{"uuid": "e0e8969d-c4f2-4c27-bf1b-e86259b08f52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1661", "type": "published-proof-of-concept", "source": "https://t.me/suboxone_chatroom/7482", "content": "CVE-2025-1661: Path Traversal in The HUSKY WordPress Plugin, 9.8 rating \ud83d\udd25\n\nThe vulnerability allows an attacker to execute arbitrary files on the server, including PHP code.\n\nSearch at Netlas.io:\n\ud83d\udc49 Link: https://nt.ls/OEg7k\n\ud83d\udc49 Dork: http.body:\"plugins/woocommerce-products-filter\"\n\nRead more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/woocommerce-products-filter/husky-products-filter-professional-for-woocommerce-1365-unauthenticated-local-file-inclusion", "creation_timestamp": "2025-04-01T12:38:12.000000Z"}