Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RealMag777 HUSKY woocommerce-products-filter allows PHP Local File Inclusion.This issue affects HUSKY: from n/a through <= 1.3.7.
Published: 2025-06-20
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An improper control of filename in the RealMag777 HUSKY WooCommerce Products Filter plugin allows local file inclusion when an attacker supplies a crafted input to the include/require statement. The flaw can be leveraged to read arbitrary files on the server or execute malicious PHP code uploaded by an adversary, which in turn can lead to full site compromise and loss of confidentiality, integrity, and availability.

Affected Systems

WordPress sites that have installed the RealMag777 HUSKY WooCommerce Products Filter plugin, specifically versions up to and including 1.3.7. The vulnerability applies to any instance of the plugin from its first release through version 1.3.7.

Risk and Exploitability

The CVSS score of 7.5 indicates a significant risk, while the EPSS score of less than 1% suggests that exploitation has not been widely observed yet. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is a web‑based request that can manipulate the file path used by the plugin’s include function; the attacker could traverse directories or supply a local file path to read sensitive data or execute arbitrary code if the server permits PHP execution of the chosen file.

Generated by OpenCVE AI on April 30, 2026 at 17:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the HUSKY plugin to the latest available version or remove it entirely if it is no longer required.
  • Patch the plugin to enforce strict filename validation before including files, thereby addressing the CWE‑98 flaw.
  • Disable PHP’s allow_url_include setting and configure open_basedir to limit PHP’s file access permissions.
  • Use a web application firewall or security plugin to block suspicious parameters that attempt to control include paths or trigger traversal attempts.

Generated by OpenCVE AI on April 30, 2026 at 17:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28451 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RealMag777 HUSKY allows PHP Local File Inclusion. This issue affects HUSKY: from n/a through 1.3.7.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RealMag777 HUSKY allows PHP Local File Inclusion. This issue affects HUSKY: from n/a through 1.3.7. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RealMag777 HUSKY woocommerce-products-filter allows PHP Local File Inclusion.This issue affects HUSKY: from n/a through <= 1.3.7.
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 23 Jun 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RealMag777 HUSKY allows PHP Local File Inclusion. This issue affects HUSKY: from n/a through 1.3.7.
Title WordPress HUSKY plugin <= 1.3.7 - Local File Inclusion Vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:17.224Z

Reserved: 2025-06-19T10:02:14.558Z

Link: CVE-2025-52708

cve-icon Vulnrichment

Updated: 2025-06-23T16:14:51.561Z

cve-icon NVD

Status : Deferred

Published: 2025-06-20T15:15:32.050

Modified: 2026-04-23T15:32:03.640

Link: CVE-2025-52708

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T17:45:26Z

Weaknesses