{"uuid": "6dc39dfa-bc4e-4a7d-8f99-d28a6ca85aa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-25600", "type": "exploited", "source": "https://t.me/MrVGunz/1213", "content": "\ud83d\udccd \u0647\u0634\u062f\u0627\u0631: \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc \u062f\u0631 \u0627\u0641\u0632\u0648\u0646\u0647 \u0628\u0631\u06cc\u06a9\u0633 \u0628\u06cc\u0644\u062f\u0631 \u0648\u0631\u062f\u067e\u0631\u0633\n\n\u062f\u0631 \u062a\u0627\u0632\u0647\u200c\u062a\u0631\u06cc\u0646 \u06af\u0632\u0627\u0631\u0634\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc\u060c \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc \u062f\u0631 \u0627\u0641\u0632\u0648\u0646\u0647 \u0628\u0631\u06cc\u06a9\u0633 \u0628\u06cc\u0644\u062f\u0631 \u0648\u0631\u062f\u067e\u0631\u0633 (CVE-2024-25600) \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u062c\u0627\u0632\u0647 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (RCE) \u0631\u0627 \u0645\u06cc\u200c\u062f\u0647\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0646\u0645\u0631\u0647 \u062e\u0637\u0631 9.8 \u062f\u0631 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc 1.9.6 \u0648 \u067e\u0627\u06cc\u06cc\u0646\u200c\u062a\u0631 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f \u0648 \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0646\u06cc\u0627\u0632 \u0646\u062f\u0627\u0634\u062a\u0646 \u0628\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc\u200c\u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u06cc \u062e\u0627\u0635\u060c \u0628\u0633\u06cc\u0627\u0631 \u062e\u0637\u0631\u0646\u0627\u06a9 \u0627\u0633\u062a. \u0633\u0627\u0632\u0645\u0627\u0646 WordFence \u0627\u0639\u0644\u0627\u0645 \u06a9\u0631\u062f\u0647 \u06a9\u0647 \u0637\u06cc 24 \u0633\u0627\u0639\u062a \u06af\u0630\u0634\u062a\u0647\u060c \u0686\u0646\u062f\u06cc\u0646 \u062a\u0644\u0627\u0634 \u0628\u0631\u0627\u06cc \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0631\u0627 \u0645\u0633\u062f\u0648\u062f \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062a\u0648\u0635\u06cc\u0647 \u0634\u062f\u0647:\n\u0645\u0631\u06a9\u0632 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0628\u0644\u0698\u06cc\u06a9 (CCB) \u062a\u0627\u06a9\u06cc\u062f \u06a9\u0631\u062f\u0647 \u06a9\u0647 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0628\u0627\u06cc\u062f \u0628\u0627 \u0627\u0648\u0644\u0648\u06cc\u062a \u0628\u0627\u0644\u0627 \u0646\u0635\u0628 \u0634\u0648\u0646\u062f. \u0647\u0645\u0686\u0646\u06cc\u0646\u060c \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627 \u0628\u0627\u06cc\u062f \u0642\u0627\u0628\u0644\u06cc\u062a\u200c\u0647\u0627\u06cc \u0646\u0638\u0627\u0631\u062a \u0648 \u062a\u0634\u062e\u06cc\u0635 \u062e\u0648\u062f \u0631\u0627 \u0628\u0631\u0627\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0641\u0639\u0627\u0644\u06cc\u062a\u200c\u0647\u0627\u06cc \u0645\u0634\u06a9\u0648\u06a9 \u0627\u0631\u062a\u0642\u0627 \u062f\u0647\u0646\u062f \u062a\u0627 \u062f\u0631 \u0635\u0648\u0631\u062a \u0648\u0642\u0648\u0639 \u0646\u0641\u0648\u0630\u060c \u0628\u062a\u0648\u0627\u0646\u0646\u062f \u0628\u0647 \u0633\u0631\u0639\u062a \u0648\u0627\u06a9\u0646\u0634 \u0646\u0634\u0627\u0646 \u062f\u0647\u0646\u062f. \u0647\u0645\u0686\u0646\u06cc\u0646 \u0627\u0645\u06a9\u0627\u0646 \u06af\u0632\u0627\u0631\u0634 \u062f\u0627\u062f\u0646 \u062d\u0627\u062f\u062b\u0647 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0648\u0628\u200c\u0633\u0627\u06cc\u062a CCB \u0641\u0631\u0627\u0647\u0645 \u0627\u0633\u062a.\n\n\n\ud83d\udd17 \u062c\u0647\u062a \u0645\u0637\u0627\u0644\u0639\u0647 \u0627\u062f\u0627\u0645\u0647 \u0645\u0642\u0627\u0644\u0647 \u0628\u0647 \u0627\u06cc\u0646 \u0633\u0627\u06cc\u062a \u0645\u0631\u0627\u062c\u0639\u0647 \u06a9\u0646\u06cc\u062f:\n\n\n\ud83d\udd3a https://cert.be/en/advisory/warning-critical-vulnerability-affects-wordpress-bricks-builder\n\n\ud83d\udccd Warning: Critical Vulnerability in WordPress Bricks Builder Plugin\n\nRecent security reports have identified a critical vulnerability in the WordPress Bricks Builder plugin (CVE-2024-25600) that allows attackers to execute remote code (RCE). This vulnerability, with a severity score of 9.8, exists in versions 1.9.6 and earlier and is particularly dangerous because it does not require specific user access privileges. WordFence has reported blocking several exploitation attempts of this vulnerability within the last 24 hours.\n\nRecommended Actions:\nThe Belgian Cyber Security Centre (CCB) emphasizes that security updates should be installed as a high priority. Additionally, organizations should enhance their monitoring and detection capabilities to identify suspicious activities promptly and respond quickly in case of a breach. Incident reporting through the CCB website is also available.\n\n\ud83d\udd17 For further reading, please visit: \n\n\ud83d\udd3a https://cert.be/en/advisory/warning-critical-vulnerability-affects-wordpress-bricks-builder", "creation_timestamp": "2024-07-22T17:33:56.000000Z"}