Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-25600 PoC — WordPress Bricks Theme <= 1.9.6 - Unauthenticated Remote Code Execution (RCE) vulnerability

Source
Associated Vulnerability
Title:WordPress Bricks Theme <= 1.9.6 - Unauthenticated Remote Code Execution (RCE) vulnerability (CVE-2024-25600)
Description:Improper Control of Generation of Code ('Code Injection') vulnerability in Codeer Limited Bricks Builder allows Code Injection.This issue affects Bricks Builder: from n/a through 1.9.6.
Description
cve-2024-25600-report
Readme
# Bricks Heist THM Walkthrough — CVE-2024-25600 & More

![Proof it works](rce.png)

---

## What I did

- Created a **custom Python exploit** for Bricks Builder RCE (exploit code in private repo)  
- Extracted the nonce from the homepage JavaScript  
- Sent PHP wrapped in an Exception to get command output  
- Obtained shell access, created reverse shell and found a hidden `.txt` flag  
- Identified suspicious process `nm-inet-dialog` and related service `ubuntu.service`  
- Located miner config file `inet.conf` and extracted the wallet address  
- Used OSINT to link wallet to a known threat group

---

## How I did it

- Developed a Python script targeting the vulnerable REST API endpoint  
- Launched a stabilized Reverse Shell  
- Explored running processes, systemd services, and log files  
- Analyzed miner config and gathered intelligence  
- Collected all flags and relevant data

---

## Challenges & Lessons

- Figuring out the exact service and hidden files took digging  
- Mining address was weird encoded, had to decode with [CyberChef](https://gchq.github.io/CyberChef/)

---

## Useful links

- [TryHackMe Profile](https://tryhackme.com/p/frankfm)  
- [Bricks Heist Room](https://tryhackme.com/room/tryhack3mbricksheist)
File Snapshot

[4.0K] /data/pocs/708f3c37c5dbaa08bf7a3c111f6871b64e1022cd ├── [ 40K] rce.png └── [1.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →