Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-25600 PoC — WordPress Plugin Bricks Builder Theme 安全漏洞

Source
Associated Vulnerability
Title:WordPress Plugin Bricks Builder Theme 安全漏洞 (CVE-2024-25600)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress Plugin Bricks Builder Theme 1.9.6版本存在安全漏洞,该漏洞源于允许攻击者通过利用随机数泄漏来绕过身份验证来执行任意 PHP 代码。
Description
PoC for CVE-2024-25600
Readme
# Exploit Repository: CVE-2024-25600

🔥 **Unauthenticated RCE Exploit for WordPress Bricks Builder**

---

Welcome to the official repository for the CVE-2024-25600 exploit targeting WordPress Bricks Builder version 1.9.6 and below. This exploit allows for the execution of arbitrary code remotely, posing a significant security risk to WordPress websites utilizing this plugin.

### Repository Information
- **Name:** CVE-2024-25600
- **Description:** Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.
- **Topics:** bricks-builder, bricksbuilder, cve-2024-25600, exploit, hacking, pentesting, python-3, python3, rce, rce-exploit, remote-code-execution, security-research, security-researcher, vulnerability, wordpress, wordpress-plugin

### Get the Exploit
Copy and paste the command below in your terminal to access the exploit and begin testing for vulnerabilities in WordPress Bricks Builder.

```bash
git clone https://github.com/meli0dasH4ck3r/cve-2024-25600.git
```

### Exploit Details
Upon successful execution of this exploit, malicious actors can remotely execute code on WordPress sites using the vulnerable Bricks Builder plugin version 1.9.6 or earlier. This remote code execution vulnerability poses a serious threat to website security and must be addressed promptly by site administrators.

### Usage Instructions
1. Download the exploit from the provided link.
2. Follow the instructions within the exploit to deploy it effectively.
3. Conduct thorough security testing on WordPress sites using Bricks Builder to identify and mitigate this vulnerability.

### Stay Secure
It is crucial for website owners and administrators to stay vigilant about security vulnerabilities in plugins like Bricks Builder. Regularly update plugins, monitor for security advisories, and take proactive measures to protect your website from potential exploits.

### Support and Contact
For any inquiries or support regarding this exploit or related security research, feel free to reach out to the repository owner. Your security is our top priority, and we are here to assist you in securing your WordPress website effectively.

---

Protect your WordPress site from potential security threats by addressing CVE-2024-25600 today. Stay proactive in ensuring the safety and integrity of your online presence. Use this exploit responsibly for security testing and research purposes only.

Let's work together to strengthen website security and safeguard against malicious attacks. Happy testing and stay secure! 🛡️🚀🔒
File Snapshot

[4.0K] /data/pocs/a2252b775865fc9d2fc89e5c44874248fdd21565 ├── [8.4K] exploit.py ├── [ 11K] LICENSE └── [2.5K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.