Bricks Builder WordPress插件远程代码执行漏洞

漏洞信息

漏洞名称: Bricks Builder WordPress插件远程代码执行漏洞

漏洞编号:

  • CVE: CVE-2024-25600

漏洞类型: 命令执行

漏洞等级: 高危

漏洞描述: Bricks Builder是一款流行的WordPress页面构建插件,广泛用于创建和定制网站页面。它提供了一个直观的拖放界面,使得非技术用户也能轻松设计网站。由于其广泛的应用,该插件的安全性对大量网站至关重要。此次发现的远程代码执行(RCE)漏洞,编号为CVE-2024-25600,允许攻击者通过注入PHP代码到易受攻击的REST API端点,实现未授权的远程命令执行。漏洞的技术根源在于插件对用户输入的验证不足,导致攻击者可以构造恶意请求执行任意代码。这一漏洞的危害性极高,因为它不需要任何形式的认证即可被利用,且可以导致完全控制受影响的网站。攻击者可以利用此漏洞进行数据泄露、网站篡改、甚至作为进一步攻击的跳板。由于漏洞的利用方式简单且影响广泛,所有使用Bricks Builder插件的WordPress网站都应立即检查并更新到最新版本以避免潜在的安全风险。

产品厂商: Bricks Builder

产品名称: Bricks Builder WordPress Plugin

来源: https://github.com/r0otk3r/CVE-2024-25600

类型: CVE-2024:github search

仓库文件

  • README.md
  • analyze_results.py
  • cve_2024_25600_bricks_rce.py

来源概述

Bricks Builder RCE Exploit (CVE-2024-25600)

This project contains a Python-based exploit script targeting the Bricks Builder WordPress plugin Remote Code Execution (RCE) vulnerability identified as CVE-2024-25600. The exploit allows unauthorized remote command execution by injecting PHP code via a vulnerable REST API endpoint.

Additionally, an analysis script is provided to parse and summarize the exploit results, including extracting user info and performing IP geolocation lookups.


Features

  • Automated nonce extraction from target URL.
  • Test payload to verify vulnerability.
  • Backdoor payload injection enabling arbitrary command execution via HTTP GET.
  • Optional command execution immediately after backdoor injection.
  • Supports single targets or multiple targets from a file.
  • Proxy support for traffic routing (e.g., through Burp Suite).
  • Output logging to file for audit and review.
  • Analysis tool to parse result logs and provide detailed summaries with IP geolocation.

Requirements

  • Python 3.x
  • curl command-line tool installed and accessible in PATH.
  • Internet access for IP geolocation queries.
  • Optional: Proxy (e.g., Burp Suite) for intercepting requests.

Usage

Exploit Script

1
python3 exploit.py -u <target_url> [-p <proxy_url>] [-o <output_file>] [-c <command>]
help

Example:

1
python3 cve_2024_25600_bricks_rce.py -u <TARGET> -p "http://127.0.0.1:8080" -o results.txt -c "uname -a"
rce

Analyze Results

1
python3 analyze_results.py --input results.txt --output summary.txt
  • Parses the exploit results file.

  • Extracts user info, tokens, timestamps, and other metadata.

  • Resolves IP address and fetches geolocation data.

  • Outputs a formatted summary report.

⚠️ Disclaimer

This tool is intended for authorized security testing and educational purposes only. Unauthorized use against systems without permission is illegal and unethical.


Bricks Builder WordPress插件远程代码执行漏洞
http://example.com/2025/07/10/github_2168913445/
作者
lianccc
发布于
2025年7月10日
许可协议