Article Details
Scrape Timestamp (UTC): 2024-02-20 09:09:25.899
Source: https://thehackernews.com/2024/02/wordpress-bricks-theme-under-active.html
Original Article Text
Click to Toggle View
WordPress Bricks Theme Under Active Attack: Critical Flaw Impacts 25,000+ Sites. A critical security flaw in the Bricks theme for WordPress is being actively exploited by threat actors to run arbitrary PHP code on susceptible installations. The flaw, tracked as CVE-2024-25600 (CVSS score: 9.8), enables unauthenticated attackers to achieve remote code execution. It impacts all versions of the Bricks up to and including 1.9.6. It has been addressed by the theme developers in version 1.9.6.1 released on February 13, 2024, merely days after WordPress security provider Snicco reported the flaw on February 10. While a proof-of-concept (PoC) exploit has not been released, technical details have been released by both Snicco and Patchstack, noting that the underlying vulnerable code exists in the prepare_query_vars_from_settings() function. Specifically, it concerns the use of security tokens called "nonces" for verifying permissions, which can then be used to pass arbitrary commands for execution, effectively allowing a threat actor to seize control of a targeted site. The nonce value is publicly available on the frontend of a WordPress site, Patchstack said, adding there are no adequate role checks applied. "Nonces should never be relied on for authentication, authorization, or access control," WordPress cautions in its documentation. "Protect your functions using current_user_can(), and always assume nonces can be compromised." WordPress security company Wordfence said it detected over three dozen attack attempts exploiting the flaw as of February 19, 2024. Exploitation attempts are said to have commenced on February 14, a day after public disclosure. A majority of the attacks are from the following IP addresses - Bricks is estimated to have around 25,000 currently active installations. Users of the plugin are recommended to apply the latest patches to mitigate potential threats. ⚡ Free Risk Assessment from Vanta Generate a gap assessment of your security and compliance posture, discover shadow IT, and more.
Daily Brief Summary
A critical vulnerability in the WordPress Bricks theme, tracked as CVE-2024-25600 with a 9.8 CVSS score, is currently being exploited.
The flaw allows unauthenticated threat actors to perform remote code execution on sites using versions of Bricks up to 1.9.6.
The theme's developers released a patch in version 1.9.6.1 shortly after the issue was reported by security provider Snicco.
The vulnerability is within the `prepare_query_vars_from_settings()` function and relates to insecure use of 'nonces' for permissions verification.
WordPress security firm Wordfence observed over three dozen attempts to exploit this vulnerability since its public disclosure.
The flaw was actively exploited starting February 14, a day after the vulnerability details were publicly disclosed.
An estimated 25,000 active installations of the Bricks theme are at risk, and users are urged to update to the latest version.