Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Codeer Limited | Bricks Builder | n/a ~ 1.9.6 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Unauthenticated Remote Code Execution – Bricks <= 1.9.6 | https://github.com/Chocapikk/CVE-2024-25600 | POC Details |
| 2 | Nuclei template and information about the POC for CVE-2024-25600 | https://github.com/Christbowel/CVE-2024-25600_Nuclei-Template | POC Details |
| 3 | This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands. | https://github.com/Tornad0007/CVE-2024-25600-Bricks-Builder-plugin-for-WordPress | POC Details |
| 4 | (Mirorring) | https://github.com/hy011121/CVE-2024-25600-wordpress-Exploit-RCE | POC Details |
| 5 | A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE) | https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT | POC Details |
| 6 | This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands. | https://github.com/0bl1v10nf0rg0773n/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress | POC Details |
| 7 | WORDPRESS-CVE-2024-25600-EXPLOIT-RCE - WordPress Bricks Builder Remote Code Execution (RCE) | https://github.com/X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE | POC Details |
| 8 | None | https://github.com/RHYru9/CVE-2024-25600-mass | POC Details |
| 9 | None | https://github.com/k3lpi3b4nsh33/CVE-2024-25600 | POC Details |
| 10 | None | https://github.com/WanLiChangChengWanLiChang/CVE-2024-25600 | POC Details |
| 11 | 0BL1V10N's CVE-2024-25600 for Bricks Builder (TryHackMe) plugin for WordPress exploit | https://github.com/ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress | POC Details |
| 12 | None | https://github.com/KaSooMi0228/CVE-2024-25600-Bricks-Builder-WordPress | POC Details |
| 13 | None | https://github.com/svchostmm/CVE-2024-25600-mass | POC Details |
| 14 | Unauthenticated Remote Code Execution – Bricks | https://github.com/wh6amiGit/CVE-2024-25600 | POC Details |
| 15 | Repository for internship test task. | https://github.com/Sibul-Dan-Glokta/test-task-CVE-2024-25600 | POC Details |
| 16 | Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely. | https://github.com/so1icitx/CVE-2024-25600 | POC Details |
| 17 | Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely. | https://github.com/cboss43/CVE-2024-25600 | POC Details |
| 18 | PoC for CVE-2024-25600 | https://github.com/meli0dasH4ck3r/cve-2024-25600 | POC Details |
| 19 | OD&H's scanner for CVE-2024-25600 vulnerability in the Bricks Builder WordPress plugin. For use in Try Hack Me (THM) environments. | https://github.com/ivanbg2004/ODH-BricksBuilder-CVE-2024-25600-THM | POC Details |
| 20 | Bricks Builder is a popular WordPress development theme with approximately 25,000 active installations. It provides an intuitive drag-and-drop interface for designing and building WordPress websites. Bricks <= 1.9.6 is vulnerable to unauthenticated remote code execution (RCE) which means that anybody can run arbitrary commands and take over the site/server. This can lead to various malicious activities | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-25600.yaml | POC Details |
| 21 | None | https://github.com/NanoWraith/CVE-2024-25600 | POC Details |
| 22 | Tools for scan CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE) | https://github.com/DedsecTeam-BlackHat/Poleposph | POC Details |
| 23 | None | https://github.com/r0otk3r/CVE-2024-25600 | POC Details |
| 24 | cve-2024-25600-report | https://github.com/frankfm-labs/bricks-rce-writeup | POC Details |
| 25 | Modified the CVE-2024-25600 | https://github.com/ranjithxploit/CVE-2024-25600 | POC Details |
| 26 | 🧱 CVE-2024-25600 WordPress Bricks Builder RCE Exploit + TryHackMe Bricks Heist CTF Write-up | https://github.com/h0w1tzxr/TryHack3M-Bricks-Heist | POC Details |
| 27 | Unauthenticated remote code execution vulnerability in WordPress Bricks Builder <= 1.9.6. The template render endpoint accepts PHP code without authentication, allowing arbitrary command execution as the web server user. | https://github.com/estebanzarate/CVE-2024-25600-WordPress-Bricks-Builder-RCE-PoC | POC Details |
No public POC found.
Login to generate AI POCNo comments yet