CVE-2024-3711

4.3 MEDIUM

📋 TL;DR

The Brizy Page Builder WordPress plugin has a missing capability check vulnerability that allows authenticated users with contributor-level access or higher to modify plugin settings. Attackers can enable/disable the Brizy editor and change templates without proper authorization. This affects all WordPress sites using Brizy Page Builder up to version 2.4.43.

💻 Affected Systems

Products:
  • Brizy - Page Builder WordPress Plugin
Versions: All versions up to and including 2.4.43
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Brizy plugin and at least one user with contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could disable the Brizy editor for all users, disrupt website editing workflows, or change templates to inject malicious content that affects site visitors.

🟠

Likely Case

Malicious contributors could modify site templates or disable the editor to cause minor disruption to content management operations.

🟢

If Mitigated

With proper user role management and monitoring, impact is limited to minor configuration changes that can be quickly reverted.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with contributor privileges or higher. The vulnerability is simple to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.44

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3086506%40brizy%2Ftrunk&old=3058896%40brizy%2Ftrunk

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Brizy Page Builder and click 'Update Now'. 4. Alternatively, download version 2.4.44+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Temporarily disable Brizy plugin

all

Deactivate the Brizy plugin until patched to prevent exploitation

wp plugin deactivate brizy

Restrict user roles

all

Temporarily remove contributor access or limit user roles that can access WordPress admin

🧯 If You Can't Patch

  • Implement strict user role management and review all users with contributor access or higher
  • Enable WordPress security plugins that monitor for unauthorized configuration changes

🔍 How to Verify

Check if Vulnerable:

Check Brizy plugin version in WordPress admin panel under Plugins > Installed Plugins

Check Version:

wp plugin get brizy --field=version

Verify Fix Applied:

Verify Brizy plugin version is 2.4.44 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • WordPress admin logs showing unauthorized access to Brizy plugin settings
  • User role changes or unusual contributor-level activity

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action parameters containing 'brizy_'

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND http_method="POST" AND (form_data.action="brizy_action_request_disable" OR form_data.action="brizy_action_change_template" OR form_data.action="brizy_action_request_enable"))

🔗 References

📤 Share & Export