Show plain JSON{"id": "CVE-2024-2297", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "security@wordfence.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.2}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2025-02-27T06:15:21.477", "references": [{"url": "https://bricksbuilder.io/release/bricks-1-9-7/", "tags": ["Release Notes"], "source": "security@wordfence.com"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cb075e85-75fc-4008-8270-4d1064ace29e?source=cve", "tags": ["Third Party Advisory"], "source": "security@wordfence.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "security@wordfence.com", "description": [{"lang": "en", "value": "CWE-269"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "The Bricks theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.9.6.1. This is due to insufficient validation checks placed on the create_autosave AJAX function. This makes it possible for authenticated attackers, with contributor-level access and above, to execute arbitrary PHP code with elevated (administrator-level) privileges. NOTE: Successful exploitation requires (1) the Bricks Builder to be enabled for posts (2) Builder access to be enabled for contributor-level users, and (3) \"Code Execution\" to be enabled for administrator-level users within the theme's settings."}, {"lang": "es", "value": "El tema Bricks para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 1.9.6.1 incluida. Esto se debe a que no se han realizado suficientes comprobaciones de validaci\u00f3n en la funci\u00f3n AJAX create_autosave. Esto permite que atacantes autenticados, con acceso de nivel de colaborador o superior, ejecuten c\u00f3digo PHP arbitrario con privilegios elevados (de nivel de administrador). NOTA: Para que esta vulnerabilidad se aproveche con \u00e9xito, es necesario que (1) el constructor de Bricks est\u00e9 habilitado para las publicaciones, (2) que el acceso al constructor est\u00e9 habilitado para los usuarios de nivel de colaborador y (3) que la \"ejecuci\u00f3n de c\u00f3digo\" est\u00e9 habilitada para los usuarios de nivel de administrador en la configuraci\u00f3n del tema."}], "lastModified": "2025-03-11T19:39:40.640", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bricksbuilder:bricks:*:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "92D42BD1-9F1B-43EE-B34D-0603B0A868F9", "versionEndExcluding": "1.9.7"}], "operator": "OR"}]}], "sourceIdentifier": "security@wordfence.com"}