CVE-2024-3242
📋 TL;DR
The Brizy Page Builder WordPress plugin allows authenticated attackers with contributor-level access or higher to upload arbitrary files due to insufficient file extension validation. This vulnerability can lead to remote code execution on affected WordPress sites. All versions up to and including 2.4.43 are vulnerable.
💻 Affected Systems
- Brizy - Page Builder WordPress plugin
📦 What is this software?
Brizy by Brizy
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete server compromise, data theft, malware deployment, or site defacement.
Likely Case
Unauthorized file upload leading to webshell installation and limited server access.
If Mitigated
File upload attempts blocked with proper validation; no impact beyond failed upload attempts.
🎯 Exploit Status
Exploitation requires contributor-level WordPress credentials; public proof-of-concept code exists in vulnerability reports.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.4.45
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3112878/brizy/trunk
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Brizy Page Builder. 4. Click 'Update Now' if update available. 5. If manual update needed, download version 2.4.45+ from WordPress.org and replace plugin files.
🔧 Temporary Workarounds
Temporary file upload restriction
linuxRestrict file uploads via .htaccess or web server configuration
# Add to .htaccess:
<FilesMatch "\.(php|sh|pl|py|cgi|exe)$">
Order Deny,Allow
Deny from all
</FilesMatch>
Disable plugin temporarily
allDeactivate Brizy plugin until patched
wp plugin deactivate brizy
🧯 If You Can't Patch
- Remove contributor role from untrusted users and restrict user registration
- Implement web application firewall rules to block suspicious file uploads
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Brizy Page Builder version number
Check Version:
wp plugin get brizy --field=version
Verify Fix Applied:
Confirm plugin version is 2.4.45 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-content/uploads/brizy/, especially .php or .sh files
- POST requests to /wp-admin/admin-ajax.php with action=storeImages
Network Indicators:
- HTTP POST requests with multipart/form-data containing executable file types
- Unusual outbound connections from WordPress server after file upload
SIEM Query:
source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND action="storeImages")
🔗 References
- https://plugins.trac.wordpress.org/browser/brizy/trunk/editor/zip/archiver.php#L264
- https://plugins.trac.wordpress.org/browser/brizy/trunk/editor/zip/archiver.php#L547
- https://plugins.trac.wordpress.org/changeset/3086506/brizy/trunk/editor/zip/archiver.php
- https://plugins.trac.wordpress.org/changeset/3112878/brizy/trunk?contextall=1&old=3086506&old_path=%2Fbrizy%2Ftrunk
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a414de0a-ae44-4955-bd25-ec6ad7860835?source=cve
- https://plugins.trac.wordpress.org/browser/brizy/trunk/editor/zip/archiver.php#L264
- https://plugins.trac.wordpress.org/browser/brizy/trunk/editor/zip/archiver.php#L547
- https://plugins.trac.wordpress.org/changeset/3086506/brizy/trunk/editor/zip/archiver.php
- https://plugins.trac.wordpress.org/changeset/3112878/brizy/trunk?contextall=1&old=3086506&old_path=%2Fbrizy%2Ftrunk
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a414de0a-ae44-4955-bd25-ec6ad7860835?source=cve