nomisec
WORKING POC
179 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2024-25600
This repository contains a functional exploit for CVE-2024-25600, an unauthenticated remote code execution vulnerability in the Bricks Builder WordPress plugin. The exploit automates nonce retrieval and command execution via crafted JSON payloads targeting the `/wp-json/bricks/v1/render_element` endpoint.
Classification
Working Poc 95%
Target:
Bricks Builder WordPress plugin (versions <= 1.9.6)
No auth needed
Prerequisites:
Target must have Bricks Builder plugin installed and vulnerable · REST API endpoint must be accessible
nomisec
WORKING POC
51 stars
by K3ysTr0K3R · remote
https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT
This is a functional exploit for CVE-2024-25600, targeting WordPress Bricks Builder plugin versions up to 1.9.6. It achieves unauthenticated remote code execution by injecting PHP code via the `render_element` REST API endpoint.
Classification
Working Poc 95%
Target:
WordPress Bricks Builder plugin <= 1.9.6
No auth needed
Prerequisites:
Target must have Bricks Builder plugin installed and vulnerable · REST API must be accessible
nomisec
WORKING POC
31 stars
by Christbowel · remote
https://github.com/Christbowel/CVE-2024-25600_Nuclei-Template
This repository provides a Nuclei template and PoC for CVE-2024-25600, an unauthenticated RCE vulnerability in the Bricks theme for WordPress. The PoC demonstrates how to execute arbitrary code via a crafted JSON payload to the `render_element` endpoint.
Classification
Working Poc 90%
Target:
Bricks theme for WordPress (versions up to and including 1.9.6)
No auth needed
Prerequisites:
Target must be running a vulnerable version of the Bricks theme · Nonce value from the target site
nomisec
WORKING POC
13 stars
by so1icitx · remote
https://github.com/so1icitx/CVE-2024-25600
This is a functional exploit for CVE-2024-25600, targeting an unauthenticated RCE vulnerability in Bricks Builder (WordPress) <= 1.9.6 via the render_element endpoint. It includes nonce extraction, command execution, and an interactive shell.
Classification
Working Poc 95%
Target:
Bricks Builder (WordPress) <= 1.9.6
No auth needed
Prerequisites:
Target must be running Bricks Builder (WordPress) <= 1.9.6 · Access to the /wp-json/bricks/v1/render_element endpoint
nomisec
WORKING POC
8 stars
by Tornad0007 · remote
https://github.com/Tornad0007/CVE-2024-25600-Bricks-Builder-plugin-for-WordPress
This repository contains a functional exploit for CVE-2024-25600, an unauthenticated RCE vulnerability in the Bricks Builder WordPress plugin. The exploit automates nonce retrieval and command execution via crafted JSON payloads to the `/wp-json/bricks/v1/render_element` endpoint.
Classification
Working Poc 95%
Target:
Bricks Builder WordPress plugin (versions <= 1.9.6)
No auth needed
Prerequisites:
Target running vulnerable Bricks Builder plugin · Access to `/wp-json/bricks/v1/render_element` endpoint · Ability to retrieve a valid nonce from the target site
github
WRITEUP
7 stars
by cybersecplayground · poc
https://github.com/cybersecplayground/PoC-and-CVE-Reports/tree/main/2024/CVE-2024-25600.md
The repository contains detailed technical writeups for multiple CVEs, including CVE-2024-25600, with descriptions, PoC examples, and mitigation recommendations. It does not include functional exploit code but provides in-depth analysis and references to external PoCs.
Classification
Writeup 95%
Target:
Various (e.g., Bricks Builder, Ivanti Connect Secure, Zabbix, Check Point VPN)
No auth needed
Prerequisites:
Access to vulnerable endpoints · Basic understanding of exploit techniques
nomisec
WORKING POC
3 stars
by hy011121 · remote
https://github.com/hy011121/CVE-2024-25600-wordpress-Exploit-RCE
This repository contains a functional exploit for CVE-2024-25600, targeting a vulnerability in the Bricks Builder WordPress plugin. The exploit leverages a command injection flaw in the plugin's render_element endpoint to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Bricks Builder WordPress plugin
No auth needed
Prerequisites:
Target must have the vulnerable Bricks Builder plugin installed · WordPress site must be accessible
nomisec
WORKING POC
1 stars
by X-Projetion · remote
https://github.com/X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE
This is a functional exploit for CVE-2024-25600, targeting a WordPress Bricks Builder RCE vulnerability. It fetches a nonce, crafts a malicious payload, and checks for successful exploitation by detecting a specific string in the response.
Classification
Working Poc 90%
Target:
WordPress Bricks Builder (version not specified)
No auth needed
Prerequisites:
Target must be running vulnerable WordPress Bricks Builder · REST API must be accessible
github
WORKING POC
by estebanzarate · pythonremote
https://github.com/estebanzarate/CVE-2024-25600-WordPress-Bricks-Builder-RCE-PoC
This repository contains a functional Python exploit for CVE-2024-25600, an unauthenticated remote code execution vulnerability in WordPress Bricks Builder <= 1.9.6. The exploit fetches a nonce, confirms vulnerability via a test payload, and provides an interactive shell by injecting commands through the render endpoint.
Classification
Working Poc 100%
Target:
WordPress Bricks Builder <= 1.9.6
No auth needed
Prerequisites:
Target must have Bricks Builder plugin active · Target must be running a vulnerable version (<= 1.9.6)
nomisec
WORKING POC
by h0w1tzxr · poc
https://github.com/h0w1tzxr/TryHack3M-Bricks-Heist
This repository contains a Python-based exploit for CVE-2024-25600, targeting WordPress Bricks Builder theme versions ≤ 1.9.6. It provides an interactive shell with file transfer capabilities and multiple payload types for unauthenticated RCE.
Classification
Working Poc 95%
Target:
WordPress Bricks Builder theme ≤ 1.9.6
No auth needed
Prerequisites:
Python 3.8+ · httpx library · rich library · network connectivity to target
nomisec
WORKING POC
by ranjithxploit · remote
https://github.com/ranjithxploit/CVE-2024-25600
This is a functional Python exploit for CVE-2024-25600, targeting a WordPress Bricks Builder plugin vulnerability that allows unauthenticated remote code execution via improper input handling in the `render_element` function. It includes automated nonce extraction and an interactive shell for command execution.
Classification
Working Poc 95%
Target:
WordPress Bricks Builder plugin (version not specified)
No auth needed
Prerequisites:
Target must have the vulnerable WordPress Bricks Builder plugin installed · Target must be accessible via HTTP/HTTPS
nomisec
WRITEUP
by Anjai7 · poc
https://github.com/Anjai7/TryHack3M-Bricks-Heist
This is a technical walkthrough of exploiting CVE-2024-25600, a WordPress Bricks theme RCE vulnerability. It includes enumeration steps, exploitation using an external PoC, and post-exploitation commands.
Classification
Writeup 90%
Target:
WordPress Bricks theme 1.9.5
No auth needed
Prerequisites:
WordPress with Bricks theme 1.9.5 · Network access to target
nomisec
WORKING POC
by r0otk3r · remote
https://github.com/r0otk3r/CVE-2024-25600
This repository contains a Python-based exploit for CVE-2024-25600, targeting a Remote Code Execution (RCE) vulnerability in the Bricks Builder WordPress plugin. The exploit automates nonce extraction, payload injection, and command execution via a vulnerable REST API endpoint, with additional analysis tools for parsing results and IP geolocation.
Classification
Working Poc 95%
Target:
Bricks Builder WordPress plugin
No auth needed
Prerequisites:
Python 3.x · curl · Internet access for IP geolocation · Target URL with vulnerable Bricks Builder plugin
nomisec
WORKING POC
by DedsecTeam-BlackHat · remote
https://github.com/DedsecTeam-BlackHat/Poleposph
This is a functional exploit for CVE-2024-25600, targeting WordPress Bricks Builder. It fetches a nonce, verifies vulnerability, and provides an interactive shell for RCE via PHP code injection.
Classification
Working Poc 95%
Target:
WordPress Bricks Builder (version not specified)
No auth needed
Prerequisites:
Target must be running vulnerable WordPress Bricks Builder · Access to the target's REST API endpoints
nomisec
SCANNER
by ivanbg2004 · remote
https://github.com/ivanbg2004/ODH-BricksBuilder-CVE-2024-25600-THM
This repository contains a Python-based vulnerability scanner for detecting CVE-2024-25600 in the Bricks Builder WordPress plugin. It uses asynchronous requests to fetch nonces and test for vulnerability, with an interactive shell for further analysis.
Classification
Scanner 95%
Target:
Bricks Builder WordPress plugin
No auth needed
Prerequisites:
Target URL with Bricks Builder plugin installed · Network access to the target
nomisec
WORKING POC
by meli0dasH4ck3r · remote
https://github.com/meli0dasH4ck3r/cve-2024-25600
This repository contains a functional Python exploit for CVE-2024-25600, an unauthenticated RCE vulnerability in WordPress Bricks Builder <= 1.9.6. The exploit leverages the `render_element` endpoint to execute arbitrary commands via a crafted JSON payload.
Classification
Working Poc 95%
Target:
WordPress Bricks Builder <= 1.9.6
No auth needed
Prerequisites:
Target must have Bricks Builder plugin <= 1.9.6 installed · WordPress site must be accessible · Python 3 environment
nomisec
WORKING POC
by Sibul-Dan-Glokta · remote
https://github.com/Sibul-Dan-Glokta/test-task-CVE-2024-25600
This repository contains a functional exploit for CVE-2024-25600, targeting a vulnerability in the Bricks theme for WordPress. The exploit leverages a REST API endpoint to achieve remote code execution (RCE) by injecting malicious payloads into query settings.
Classification
Working Poc 95%
Target:
WordPress with Bricks theme
No auth needed
Prerequisites:
Docker environment for testing · WordPress instance with Bricks theme installed
nomisec
WORKING POC
by w666-glitch · poc
https://github.com/w666-glitch/CVE-2024-25600
This repository contains a functional exploit for CVE-2024-25600, an unauthenticated RCE vulnerability in the Bricks theme for WordPress. The exploit leverages the `wp-json/bricks/v1/render_element` endpoint to inject malicious PHP code via the `queryEditor` parameter, achieving remote command execution.
Classification
Working Poc 95%
Target:
Bricks Theme for WordPress (versions affected by CVE-2024-25600)
No auth needed
Prerequisites:
Target must be running a vulnerable version of the Bricks theme · WordPress site must be accessible
nomisec
WORKING POC
by wh6amiGit · remote
https://github.com/wh6amiGit/CVE-2024-25600
This is a functional exploit for CVE-2024-25600, an unauthenticated RCE vulnerability in the Bricks theme for WordPress. It leverages the `render_element` endpoint to execute arbitrary commands via crafted JSON payloads.
Classification
Working Poc 95%
Target:
Bricks theme for WordPress (version not specified)
No auth needed
Prerequisites:
Target must have the vulnerable Bricks theme installed · WordPress site must be accessible
nomisec
WORKING POC
by KaSooMi0228 · remote
https://github.com/KaSooMi0228/CVE-2024-25600-Bricks-Builder-WordPress
This repository contains a functional exploit for CVE-2024-25600, an unauthenticated RCE vulnerability in the Bricks Builder WordPress plugin. The exploit automates nonce retrieval and command execution via crafted JSON payloads to the `/wp-json/bricks/v1/render_element` endpoint.
Classification
Working Poc 95%
Target:
Bricks Builder WordPress Plugin (versions <= 1.9.6)
No auth needed
Prerequisites:
Target must have Bricks Builder plugin installed and vulnerable · WordPress site must be accessible · No authentication required
nomisec
WORKING POC
by WanLiChangChengWanLiChang · remote
https://github.com/WanLiChangChengWanLiChang/CVE-2024-25600
This is a functional exploit PoC for CVE-2024-25600, targeting a remote code execution (RCE) vulnerability in the WordPress Bricks Builder plugin. The script automates the exploitation process by extracting a nonce value and sending crafted payloads to trigger command execution.
Classification
Working Poc 90%
Target:
WordPress Bricks Builder plugin
No auth needed
Prerequisites:
Target must have the vulnerable Bricks Builder plugin installed · Target must be accessible via HTTP/HTTPS
nomisec
WORKING POC
by NanoWraith · poc
https://github.com/NanoWraith/CVE-2024-25600
This PoC exploits CVE-2024-25600, a vulnerability in the Bricks theme for WordPress, allowing unauthenticated remote code execution via the `render_element` REST API endpoint. It retrieves a nonce, crafts a malicious payload, and verifies execution by checking for a specific string in the response.
Classification
Working Poc 95%
Target:
Bricks Theme for WordPress (version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of the Bricks theme · REST API must be accessible
nomisec
WORKING POC
by svchostmm · remote
https://github.com/svchostmm/CVE-2024-25600-mass
This is a functional exploit for CVE-2024-25600, targeting the Bricks theme for WordPress. It leverages an authentication bypass and RCE via a crafted JSON payload to the Bricks REST API endpoint.
Classification
Working Poc 95%
Target:
Bricks Theme for WordPress (version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of the Bricks theme · REST API endpoint must be accessible
vulncheck_xdb
WORKING POC
remote
https://github.com/k3lpi3b4nsh33/CVE-2024-25600
This repository contains a functional Python exploit for CVE-2024-25600, targeting a vulnerability in the Bricks theme for WordPress. The exploit retrieves a nonce from the target site and sends a crafted POST request to execute arbitrary PHP code via the 'render_element' endpoint.
Classification
Working Poc 95%
Target:
Bricks theme for WordPress (version not specified)
No auth needed
Prerequisites:
Target must be running the vulnerable Bricks theme · Target must have the 'render_element' endpoint accessible
metasploit
WORKING POC
EXCELLENT
by Calvin Alkan, Valentin Lobstein · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_bricks_builder_rce.rb
This Metasploit module exploits an unauthenticated RCE vulnerability in the Bricks Builder Theme for WordPress by leaking a nonce and abusing an eval() function to execute arbitrary PHP code.
Classification
Working Poc 100%
Target:
Bricks Builder Theme for WordPress <= 1.9.6
No auth needed
Prerequisites:
WordPress with Bricks Builder Theme <= 1.9.6 installed · Network access to the target