diff --git a/WordPress_Bricks_render_element_Remote_Code_Execution_Vulnerability_(CVE-2024-25600).md b/WordPress_Bricks_render_element_Remote_Code_Execution_Vulnerability_(CVE-2024-25600).md new file mode 100644 index 0000000..d7e503d --- /dev/null +++ b/WordPress_Bricks_render_element_Remote_Code_Execution_Vulnerability_(CVE-2024-25600).md @@ -0,0 +1,12 @@ +## WordPress Bricks render_element Remote Code Execution Vulnerability (CVE-2024-25600) + +| **Vulnerability** | WordPress Bricks render_element Remote Code Execution Vulnerability (CVE-2024-25600) | +| :----: | :-----| +| **Chinese name** | WordPress Bricks render_element 远程代码执行漏洞(CVE-2024-25600) | +| **CVSS core** | 9.8 | +| **FOFA Query** (click to view the results directly)| [app="wordpress-bricks"](https://en.fofa.info/result?qbase64=Ym9keT0iL3dwLWNvbnRlbnQvdGhlbWVzL2JyaWNrcyI%3D)| +| **Number of assets affected** | 25433 | +| **Description** | WordPress Bricks is an innovative, community driven, and visual WordPress website builder that allows you to design unique, high-performance, and scalable websites.WordPress Bricks has a remote code execution vulnerability, which allows attackers to execute code arbitrarily on the server side, write backdoors, gain server privileges, and then control the entire web server. | +| **Impact** | WordPress Bricks has a remote code execution vulnerability, which allows attackers to execute code arbitrarily on the server side, write backdoors, gain server privileges, and then control the entire web server. | + +![](https://s3.bmp.ovh/imgs/2024/02/23/70784f1d16f8316e.gif).