Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 15 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WOOF Products Filter for WooCommerce 1.2.3 contains a persistent cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts by entering XSS payloads in design tab textfields. Attackers can inject JavaScript code through fields like 'Text for block toggle' and 'Custom front css styles' that executes on frontend pages when saved, affecting all site visitors. | |
| Title | WOOF Products Filter for WooCommerce 1.2.3 Persistent XSS | |
| First Time appeared |
Pluginus
Pluginus husky - Products Filter Professional For Woocommerce |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:pluginus:husky_-_products_filter_professional_for_woocommerce:1.2.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Pluginus
Pluginus husky - Products Filter Professional For Woocommerce |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-15T13:43:54.111Z
Reserved: 2026-02-10T17:51:52.146Z
Link: CVE-2020-37174
Updated: 2026-05-15T13:43:37.879Z
Status : Deferred
Published: 2026-05-13T16:16:32.880
Modified: 2026-05-13T17:07:21.030
Link: CVE-2020-37174
No data.
OpenCVE Enrichment
Updated: 2026-05-13T17:15:26Z