Cyber Posture

CVE-2024-2297

High

Published: 27 February 2025

Published
27 February 2025
Modified
11 March 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0022 45.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

The Bricks theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.9.6.1. This is due to insufficient validation checks placed on the create_autosave AJAX function. This makes it possible for authenticated attackers, with contributor-level access and above, to execute arbitrary PHP code with elevated (administrator-level) privileges. NOTE: Successful exploitation requires (1) the Bricks Builder to be enabled for posts (2) Builder access to be enabled for contributor-level users, and (3) "Code Execution" to be enabled for administrator-level users within the theme's settings.

Security Summary

CVE-2024-2297 is a privilege escalation vulnerability affecting the Bricks theme for WordPress in all versions up to and including 1.9.6.1. The issue stems from insufficient validation checks in the create_autosave AJAX function, which allows authenticated attackers to bypass access controls. It has a CVSS v3.1 base score of 7.1 (AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H) and is associated with CWE-269 (Improper Privilege Management).

Attackers with contributor-level access or higher can exploit this vulnerability to execute arbitrary PHP code with administrator-level privileges. Successful exploitation requires three specific conditions: the Bricks Builder must be enabled for posts, builder access must be enabled for contributor-level users, and "Code Execution" must be enabled for administrator-level users within the theme's settings. This enables network-based attacks with low privileges, user interaction, and high impact on confidentiality, integrity, and availability.

Advisories from Bricks and Wordfence recommend updating to Bricks version 1.9.7, which addresses the vulnerability. Security practitioners should verify theme settings to ensure the required conditions are not met and monitor for unauthorized admin actions on affected sites. Full details are available at https://bricksbuilder.io/release/bricks-1-9-7/ and https://www.wordfence.com/threat-intel/vulnerabilities/id/cb075e85-75fc-4008-8270-4d1064ace29e?source=cve.

Details

CWE(s)
CWE-269NVD-CWE-noinfo

Affected Products

bricksbuilder
bricks
≤ 1.9.7

References