Open Nav
Sign Up

CVE-2024-25600: WordPress’s Bricks Builder RCE Flaw Under Active Exploitation

Bar Refael

February 20, 2024

A critical Remote Code Execution (RCE) vulnerability, identified as CVE-2024-25600 (CVSS score: 9.8), has been discovered in the widely used WordPress site builder, Bricks Builder. This vulnerability is currently being actively exploited, posing a significant risk to websites using this theme.

Vulnerability Details:

  • CVE ID: CVE-2024-25600
  • CVSS Score: 9.8 (Critical)
  • Affected Software: Bricks Builder for WordPress
  • Affected Versions: All versions prior to 1.9.6.1
  • Impact: Unauthenticated remote code execution

Description:

Bricks Builder is a popular WordPress development theme with approximately 25,000 active installations. It provides an intuitive drag-and-drop interface for designing and building WordPress websites.

The vulnerability allows unauthenticated attackers to execute arbitrary code on the server hosting the WordPress site. This can lead to various malicious activities, including:

  • Installing malware or backdoors
  • Stealing sensitive data
  • Defacing the website
  • Using the server for further attacks

Mitigation:

Bricks Builder has released a patch (version 1.9.6.1) to address this vulnerability. It is imperative that all users of Bricks Builder update to this version immediately to secure their sites. Delaying the update increases the risk of exploitation.

Updating Bricks Builder can typically be done directly within your WordPress dashboard. For detailed instructions, refer to the Bricks Builder website or their official documentation.

Active Exploitation:

Security experts at Wordfence have confirmed multiple attacks targeting CVE-2024-25600 in the last 24 hours. The attacks have originated from several IP addresses, including but not limited to:

  • 200.251.23.57
  • 92.118.170.216
  • 103.187.5.128
  • 149.202.55.79
  • 5.252.118.211
  • 91.108.240.52

Additionally, malware specifically designed to exploit this vulnerability has been observed, with features to disable security-related plugins such as Wordfence and Sucuri.

Recommendations:

  • Immediate Action: Update Bricks Builder to version 1.9.6.1 without delay.
  • Monitor: Keep an eye on your website for any suspicious activity and regularly check for updates and patches for all installed themes and plugins.
  • Security Measures: Ensure that your website is protected with robust security measures, including firewalls, security plugins, and regular backups.

Conclusion:

The CVE-2024-25600 vulnerability in WordPress’s Bricks Builder is a critical threat that requires immediate attention. By promptly updating to the patched version and maintaining vigilant security practices, you can protect your website from potential exploitation and ensure the safety of your digital assets.

Stay safe and informed,

OP Innovate Security Team

Resources highlights

Over 600 Laravel Applications Vulnerable to Remote Code Execution via Leaked APP_KEYs (CVE-2018-15133, CVE-2024-55556)

Security researchers have uncovered a major RCE threat affecting over 600 Laravel applications, triggered by leaked APP_KEYs found on public GitHub repositories. Laravel's APP_KEY, typically…

Read more >

CVE-2018-15133, CVE-2024-55556

CVE-2025-3648: “Count(er) Strike” Vulnerability in ServiceNow

CVE-2025-3648, dubbed “Count(er) Strike”, is a high-severity vulnerability (CVSS 8.2) in ServiceNow's Now Platform, discovered by Varonis Threat Labs. The flaw allows both authenticated and…

Read more >

CVE-2025-3648

What to Look for in a Pentesting Platform (Beyond Just Scans)

Penetration testing platforms are a great way to centralize vulnerability discovery and triage. However, when evaluating penetration testing platforms, many organizations make the mistake of…

Read more >

pentesting platform

CVE-2016-10033: Actively Exploited Remote Code Execution (RCE) Vulnerability in PHPMailer

CVE-2016-10033 is a critical remote code execution vulnerability in PHPMailer, a widely used PHP library for sending emails. The flaw lies in the mailSend function…

Read more >

CVE-2016-10033

High-Severity WordPress Vulnerability in Forminator Plugin (CVE-2025-6463)

A critical vulnerability in the Forminator plugin, one of the most popular form-building plugins in Wordpress, allows unauthenticated attackers to delete arbitrary files on the…

Read more >

CVE-2025-6463

CVE-2025-6554: Chrome V8 Zero-Day Exploited in the Wild

On June 30, 2025, Google issued an emergency patch for a critical zero-day vulnerability in its Chrome browser, tracked as CVE-2025-6554. The flaw resides in…

Read more >

CVE-2025-6554
Under Cyber Attack?

Fill out the form and we will contact you immediately.