An exploit script for CVE-2024-25600, a critical unauthenticated Remote Code Execution (RCE) vulnerability in the Bricks Builder plugin for WordPress. This tool detects the flaw, extracts the nonce, and provides an interactive shell for executing arbitrary commands on vulnerable targets. Tested on Bricks Builder version 1.9.5, it affects all versions up to and including 1.9.6. This security flaw allows attackers to remotely inject and execute malicious PHP code without authentication, potentially leading to full site compromise, data theft, or malware distribution.
- so1icitx
- Tests WordPress sites for CVE-2024-25600 vulnerability by fetching the nonce and verifying RCE capability.
- Supports single URL and bulk scanning from a file for vulnerable Bricks Builder instances.
- Launches an interactive shell for remote command execution on confirmed targets.
- Multi-threaded scanning (100 threads) for efficient vulnerability detection.
- Verbose mode for detailed output during exploit attempts.
- Saves vulnerable URLs to an output file for further analysis.
- Python 3.6+
- Required packages:
pip install requests beautifulsoup4 prompt_toolkit
python3 exploit.py -u <target_url> [options]
-u, --url
: Target WordPress URL (e.g.,http://example.com
) - required for single scan.-l, --list
: Path to a file with a list of URLs for bulk RCE scanning (optional).-o, --output
: File to save vulnerable WordPress URLs (optional).
- Basic RCE exploit:
python3 exploit.py -u http://10.10.10.10
- Bulk vulnerability scanning:
python3 exploit.py -l targets.txt -o vulnerable.txt
- Interactive shell (triggered on vulnerable targets):
# whoami # exit
- Targets must use the Bricks Builder plugin with the vulnerable
/wp-json/bricks/v1/render_element
endpoint. - Exploits a flaw in user input handling, enabling unauthenticated attackers to execute arbitrary PHP code.
- Uses 100 threads for bulk scans; adjust
max_workers
in the script for performance tweaks. - SSL verification is disabled to handle self-signed certificates on WordPress sites.
- Use responsibly on authorized systems only to avoid site compromise or malware risks.
- Contact me at
so1citix.zone242@passinbox.com
for support or issues!
This tool is for educational and authorized security testing purposes only. Unauthorized exploitation of CVE-2024-25600 is illegal and unethical.