Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-25600 PoC — WordPress Bricks Theme <= 1.9.6 - Unauthenticated Remote Code Execution (RCE) vulnerability

Source
Associated Vulnerability
Title:WordPress Bricks Theme <= 1.9.6 - Unauthenticated Remote Code Execution (RCE) vulnerability (CVE-2024-25600)
Description:Improper Control of Generation of Code ('Code Injection') vulnerability in Codeer Limited Bricks Builder allows Code Injection.This issue affects Bricks Builder: from n/a through 1.9.6.
Description
Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.
Readme
# Exploit Repository: CVE-2024-25600

🔥 **Unauthenticated RCE Exploit for WordPress Bricks Builder**

---

Welcome to the official repository for the CVE-2024-25600 exploit targeting WordPress Bricks Builder version 1.9.6 and below. This exploit allows for the execution of arbitrary code remotely, posing a significant security risk to WordPress websites utilizing this plugin.

### Repository Information
- **Name:** CVE-2024-25600
- **Description:** Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.
- **Topics:** bricks-builder, bricksbuilder, cve-2024-25600, exploit, hacking, pentesting, python-3, python3, rce, rce-exploit, remote-code-execution, security-research, security-researcher, vulnerability, wordpress, wordpress-plugin

### Get the Exploit
Click the button below to access the exploit and begin testing for vulnerabilities in WordPress Bricks Builder.

[![Download Exploit](https://img.shields.io/badge/Download-Exploit-blue)](https://github.com/cboss43/CVE-2024-25600/releases)

### Exploit Details
Upon successful execution of this exploit, malicious actors can remotely execute code on WordPress sites using the vulnerable Bricks Builder plugin version 1.9.6 or earlier. This remote code execution vulnerability poses a serious threat to website security and must be addressed promptly by site administrators.

### Usage Instructions
1. Download the exploit from the provided link.
2. Follow the instructions within the exploit to deploy it effectively.
3. Conduct thorough security testing on WordPress sites using Bricks Builder to identify and mitigate this vulnerability.

### Stay Secure
It is crucial for website owners and administrators to stay vigilant about security vulnerabilities in plugins like Bricks Builder. Regularly update plugins, monitor for security advisories, and take proactive measures to protect your website from potential exploits.

### Support and Contact
For any inquiries or support regarding this exploit or related security research, feel free to reach out to the repository owner. Your security is our top priority, and we are here to assist you in securing your WordPress website effectively.

---

Protect your WordPress site from potential security threats by addressing CVE-2024-25600 today. Stay proactive in ensuring the safety and integrity of your online presence. Use this exploit responsibly for security testing and research purposes only.

Let's work together to strengthen website security and safeguard against malicious attacks. Happy testing and stay secure! 🛡️🚀🔒
File Snapshot

[4.0K] /data/pocs/d02d946b7e650e82a13dccc0855b5b2768354462 ├── [8.4K] exploit.py ├── [1.0K] LICENSE └── [2.6K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →