CVE-2025-13110
Unknown Unknown - Not Provided
IDOR Vulnerability in HUSKY WooCommerce Plugin Allows Privilege Escalation

Publication date: 2025-12-18

Last updated on: 2025-12-18

Assigner: Wordfence

Description
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.7.3 via the "woof_add_subscr" function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with subscriber level access and above, to create product messenger subscriptions on behalf of arbitrary users, including administrators.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-18
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
husky products_filter 1.3.7.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the HUSKY – Products Filter Professional for WooCommerce plugin is an Insecure Direct Object Reference (IDOR) issue in the 'woof_add_subscr' function. It occurs because the plugin does not properly validate a user-controlled key, allowing authenticated users with subscriber-level access or higher to create product messenger subscriptions on behalf of arbitrary users, including administrators. This means an attacker can impersonate other users within the system to create subscriptions without proper authorization. [2, 3]


How can this vulnerability impact me? :

This vulnerability can allow an attacker with subscriber-level access to create product messenger subscriptions on behalf of other users, including administrators. This unauthorized action could lead to manipulation of user subscriptions, potential abuse of messaging features, and unauthorized actions performed with elevated privileges. It may also facilitate further attacks by impersonating privileged users within the system. [2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

To detect this vulnerability, monitor for unauthorized or suspicious POST requests to the product messenger subscription endpoints, especially those involving the 'woof_add_subscr' function. Look for POST requests containing parameters like 'link', 'user_id', or 'key' that do not match the logged-in user's ID or originate from unexpected sources. Since the vulnerability involves authenticated users with subscriber access creating subscriptions on behalf of others, audit logs for unusual subscription creation or modification activities. Specific commands depend on your environment, but for example, using web server logs you can grep for suspicious POST requests: 1. grep 'POST /path_to_plugin/ext/products_messenger/index.php' /var/log/apache2/access.log | grep -E 'link=|user_id=|key=' 2. Use WordPress audit or security plugins to track subscription creation events and user actions. 3. Monitor for 403 Forbidden responses that indicate blocked unauthorized attempts. No direct detection commands are provided in the resources, but monitoring POST requests and user activity related to the plugin's subscription functions is recommended. [2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the WooCommerce Products Filter plugin to a version that includes the security patches addressing CVE-2025-13110. The patches implement strict input validation, authorization checks, nonce verification to prevent CSRF, and sanitization of user inputs in the 'woof_add_subscr' and related functions. If updating is not immediately possible, restrict access to the affected plugin endpoints to trusted users only, and monitor for suspicious activity. Additionally, ensure that users have appropriate permissions and that subscriber-level users cannot perform unauthorized actions. Applying the security improvements described in the changesets (such as enforcing current user ID checks, validating URLs, and verifying nonces) will mitigate the risk of exploitation. [2, 3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not explicitly discuss the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA. However, since the vulnerability allows authenticated attackers with subscriber access to create product messenger subscriptions on behalf of arbitrary users, including administrators, it could potentially lead to unauthorized actions and data manipulation. This unauthorized access might raise concerns under regulations that require strict access controls and protection of user data, but no direct compliance implications are detailed in the provided texts. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart