CVE-2024-32680
CVSS V2 None
CVSS V3 None
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Control of Generation of Code ('Code Injection') vulnerability in PluginUS HUSKY – Products Filter for WooCommerce (formerly WOOF) allows Using Malicious Files, Code Inclusion.This issue affects HUSKY – Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.5.2.
Overview
- CVE ID
- CVE-2024-32680
- Assigner
- Patchstack
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-05-17T08:59:16.132Z
- Last Modified Date
- 2024-06-06T17:33:30.899Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://patchstack.com/database/vulnerability/woocommerce-products-filter/wordpress-husky-plugin-1-3-5-2-remote-code-execution-rce-vulnerability?_s_id=cve | vdb-entry |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-32680 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32680 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 08:33:43 | Added to TrackCVE |