Open Nav
Sign Up

CVE-2024-25600: WordPress’s Bricks Builder RCE Flaw Under Active Exploitation

Bar Refael

February 20, 2024

A critical Remote Code Execution (RCE) vulnerability, identified as CVE-2024-25600 (CVSS score: 9.8), has been discovered in the widely used WordPress site builder, Bricks Builder. This vulnerability is currently being actively exploited, posing a significant risk to websites using this theme.

Vulnerability Details:

  • CVE ID: CVE-2024-25600
  • CVSS Score: 9.8 (Critical)
  • Affected Software: Bricks Builder for WordPress
  • Affected Versions: All versions prior to 1.9.6.1
  • Impact: Unauthenticated remote code execution

Description:

Bricks Builder is a popular WordPress development theme with approximately 25,000 active installations. It provides an intuitive drag-and-drop interface for designing and building WordPress websites.

The vulnerability allows unauthenticated attackers to execute arbitrary code on the server hosting the WordPress site. This can lead to various malicious activities, including:

  • Installing malware or backdoors
  • Stealing sensitive data
  • Defacing the website
  • Using the server for further attacks

Mitigation:

Bricks Builder has released a patch (version 1.9.6.1) to address this vulnerability. It is imperative that all users of Bricks Builder update to this version immediately to secure their sites. Delaying the update increases the risk of exploitation.

Updating Bricks Builder can typically be done directly within your WordPress dashboard. For detailed instructions, refer to the Bricks Builder website or their official documentation.

Active Exploitation:

Security experts at Wordfence have confirmed multiple attacks targeting CVE-2024-25600 in the last 24 hours. The attacks have originated from several IP addresses, including but not limited to:

  • 200.251.23.57
  • 92.118.170.216
  • 103.187.5.128
  • 149.202.55.79
  • 5.252.118.211
  • 91.108.240.52

Additionally, malware specifically designed to exploit this vulnerability has been observed, with features to disable security-related plugins such as Wordfence and Sucuri.

Recommendations:

  • Immediate Action: Update Bricks Builder to version 1.9.6.1 without delay.
  • Monitor: Keep an eye on your website for any suspicious activity and regularly check for updates and patches for all installed themes and plugins.
  • Security Measures: Ensure that your website is protected with robust security measures, including firewalls, security plugins, and regular backups.

Conclusion:

The CVE-2024-25600 vulnerability in WordPress’s Bricks Builder is a critical threat that requires immediate attention. By promptly updating to the patched version and maintaining vigilant security practices, you can protect your website from potential exploitation and ensure the safety of your digital assets.

Stay safe and informed,

OP Innovate Security Team

Resources highlights

Guidance to Address Ongoing Exploitation of Fortinet SSO Vulnerability (CVE-2026-24858)

CVE-2026-24858 is a critical authentication bypass in FortiCloud Single Sign-On (SSO) that can allow an attacker with a FortiCloud account and a registered device to…

Read more >

cve-2026-24858

CVE-2024-37079: VMware vCenter Server DCERPC Heap Overflow (RCE)

CVE-2024-37079 is a critical remote code execution (RCE) vulnerability in VMware vCenter Server caused by a heap overflow in the DCERPC protocol implementation. On January…

Read more >

cve-2024-37079

CVE-2026-24061: GNU Inetutils telnetd Remote Authentication Bypass

CVE-2026-24061 is a pre-authentication remote authentication bypass in GNU Inetutils telnetd. The flaw carries a Critical CVSS:3.1 severity score of 9.8 and allows an attacker…

Read more >

CVE-2026-24061

CVE-2026-0227: PAN-OS GlobalProtect Denial-of-Service Vulnerability

CVE-2026-0227 is a high-severity denial-of-service vulnerability affecting Palo Alto Networks PAN-OS and Prisma Access deployments where GlobalProtect Gateway or Portal is enabled. The flaw allows…

Read more >

cve-2026-0227

CVE-2026-20805: Windows Desktop Window Manager (DWM) Zero-Day

CVE-2026-20805 is a Windows Desktop Window Manager (DWM) information disclosure vulnerability that has been exploited in the wild as a zero-day.While the CVSS v3.1 base…

Read more >

cve-2026-20805

CVE-2025-12420 (“BodySnatcher”): Unauthenticated User Impersonation in ServiceNow AI Platform

CVE-2025-12420 is a critical (CVSS 9.3) vulnerability in the ServiceNow AI Platform that can allow a remote, unauthenticated attacker to impersonate another user and then…

Read more >

cve-2025-12420
Under Cyber Attack?

Fill out the form and we will contact you immediately.