CVE-2018-8711
WOOF - Products Filter for WooCommerce <= 1.1.9 - Local File Inclusion
criticalImproper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
9.8
CVSS Score
9.8
CVSS Score
critical
Severity
1.2.0
Patched in
2149d
Time to patch
Description
A local file inclusion issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 1.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The vulnerability is due to the lack of args/input validation on render_html before allowing it to be called by extract(), a PHP built-in function. Because of this, the supplied args/input can be used to overwrite the $pagepath variable, which then could lead to a local file inclusion attack.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HAttack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
High
Confidentiality
High
Integrity
High
Availability
Technical Details
Affected versions
<1.2.0PublishedMarch 6, 2018
Last updatedJanuary 22, 2024
Affected pluginwoocommerce-products-filter
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.