CVE-2024-10960
📋 TL;DR
The Brizy Page Builder WordPress plugin allows authenticated users with Contributor-level access or higher to upload arbitrary files due to missing file type validation. This vulnerability can lead to remote code execution on affected WordPress sites running vulnerable plugin versions.
💻 Affected Systems
- Brizy - Page Builder WordPress plugin
📦 What is this software?
Brizy by Brizy
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise via remote code execution leading to data theft, malware deployment, or complete site takeover.
Likely Case
Unauthorized file upload leading to webshell installation and limited server access.
If Mitigated
File upload attempts logged and blocked by web application firewall or file integrity monitoring.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once credentials are obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.6.5
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3222672/brizy/tags/2.6.5/editor/zip/archiver.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Brizy Page Builder and click 'Update Now'. 4. Verify version shows 2.6.5 or higher.
🔧 Temporary Workarounds
Disable plugin
allTemporarily deactivate Brizy Page Builder plugin until patched
wp plugin deactivate brizy
Restrict user roles
allRemove Contributor and higher roles from untrusted users
🧯 If You Can't Patch
- Implement web application firewall rules to block file uploads to vulnerable endpoints
- Enable file integrity monitoring on WordPress uploads directory
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Brizy Page Builder version. If version is 2.6.4 or lower, system is vulnerable.
Check Version:
wp plugin get brizy --field=version
Verify Fix Applied:
Verify Brizy Page Builder plugin version shows 2.6.5 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-content/uploads/brizy/
- PHP or executable files uploaded by Contributor-level users
Network Indicators:
- POST requests to /wp-admin/admin-ajax.php with action=brizy_upload
SIEM Query:
source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND parameters.action="brizy_upload")