CVE-2024-25600
Codeer Limited Bricks Builder Code Injection Vulnerability
Description
Improper Control of Generation of Code ('Code Injection') vulnerability in Codeer Limited Bricks Builder allows Code Injection.This issue affects Bricks Builder: from n/a through 1.9.6.
INFO
Published Date :
June 4, 2024, 1:15 p.m.
Last Modified :
Nov. 21, 2024, 9:01 a.m.
Source :
[email protected]
Remotely Exploitable :
Yes !
Impact Score :
6.0
Exploitability Score :
3.9
Public PoC/Exploit Available at Github
CVE-2024-25600 has a 52 public PoC/Exploit
available at Github.
Go to the Public Exploits
tab to see the list.
Affected Products
The following products are affected by CVE-2024-25600
vulnerability.
Even if cvefeed.io
is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
No affected product recoded yet
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-25600
.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Tools for scan CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)
Python
None
HTML
wy876
Python
OD&H's scanner for CVE-2024-25600 vulnerability in the Bricks Builder WordPress plugin. For use in Try Hack Me (THM) environments.
bricks-builder cve-2024-25600 cybersecurity exploit oblivion-development-hosting odh pentesting plugin-vulnerability security-tools thm tryhackme vulnerability-scanners web-security wordpress
Python
PoC for CVE-2024-25600
Python
Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.
cve-2021-45232 cve-2022-1388 cve-2023-51467 cve-2024-0204 cve-2024-20931 cve-2024-21893 exploitation goby hacking poc red-team remote-code-execution word wordpress
Python
Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.
bricks-builder bricksbuilder cve-2024-25600 exploit rce rce-exploit vulnerability wordpress wordpress-plugin remote-code-execution security-research security-researcher python3 python-3 hacking pentesting
Python
None
wy876 POC | wy876的poc仓库已删库,该项目为其仓库镜像
收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了1100多个poc/exp,长期更新。
备份的漏洞库,3月开始我们来维护
2023HW漏洞整理,收集整理漏洞EXp/POC,大部分漏洞来源网络,目前收集整理了300多个poc/exp,长期更新。
漏洞文库 wiki.wy876.cn
HTML
My technical write-up for TryHackMe's TryHack3M: Bricks Heist Challenge.
Repository for internship test task.
Python PHP CSS JavaScript HTML
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-25600
vulnerability anywhere in the article.

-
BleepingComputer
The 4 WordPress flaws hackers targeted the most in Q1 2025
A new report sheds light on the most targeted WordPress plugin vulnerabilities hackers used in the first quarter of 2025 to compromise sites. All four flaws are vulnerabilities discovered and fixed in ... Read more
The following table lists the changes that have been made to the
CVE-2024-25600
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://github.com/Chocapikk/CVE-2024-25600 Added Reference https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT Added Reference https://patchstack.com/articles/critical-rce-patched-in-bricks-builder-theme?_s_id=cve Added Reference https://patchstack.com/database/vulnerability/bricks/wordpress-bricks-theme-1-9-6-unauthenticated-remote-code-execution-rce-vulnerability?_s_id=cve Added Reference https://snicco.io/vulnerability-disclosure/bricks/unauthenticated-rce-in-bricks-1-9-6 -
CVE Received by [email protected]
Jun. 04, 2024
Action Type Old Value New Value Added Description Improper Control of Generation of Code ('Code Injection') vulnerability in Codeer Limited Bricks Builder allows Code Injection.This issue affects Bricks Builder: from n/a through 1.9.6. Added Reference Patchstack https://patchstack.com/database/vulnerability/bricks/wordpress-bricks-theme-1-9-6-unauthenticated-remote-code-execution-rce-vulnerability?_s_id=cve [No types assigned] Added Reference Patchstack https://snicco.io/vulnerability-disclosure/bricks/unauthenticated-rce-in-bricks-1-9-6 [No types assigned] Added Reference Patchstack https://patchstack.com/articles/critical-rce-patched-in-bricks-builder-theme?_s_id=cve [No types assigned] Added Reference Patchstack https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT [No types assigned] Added Reference Patchstack https://github.com/Chocapikk/CVE-2024-25600 [No types assigned] Added CWE Patchstack CWE-94 Added CVSS V3.1 Patchstack AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-25600
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-25600
weaknesses.