First published: Thu Feb 27 2025(Updated: )
The Bricks theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.9.6.1. This is due to insufficient validation checks placed on the create_autosave AJAX function. This makes it possible for authenticated attackers, with contributor-level access and above, to execute arbitrary PHP code with elevated (administrator-level) privileges. NOTE: Successful exploitation requires (1) the Bricks Builder to be enabled for posts (2) Builder access to be enabled for contributor-level users, and (3) "Code Execution" to be enabled for administrator-level users within the theme's settings.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bricks Builder | <=1.9.6.1 | |
Bricks | <1.9.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2297 is classified as a medium severity vulnerability due to its potential for privilege escalation.
CVE-2024-2297 affects the Bricks Builder for WordPress in all versions up to and including 1.9.6.1.
To fix CVE-2024-2297, users should update the Bricks Builder to version 1.9.7 or later.
Authenticated attackers with contributor-level access can exploit CVE-2024-2297 due to insufficient validation checks.
CVE-2024-2297 is a privilege escalation vulnerability that allows contributors to gain elevated privileges.