CVE-2024-10960
WordPress vulnerability analysis and mitigation

Overview

The Brizy – Page Builder plugin for WordPress contains a critical vulnerability (CVE-2024-10960) affecting versions up to and including 2.6.4. The vulnerability stems from missing file type validation in the 'storeUploads' function, which allows authenticated attackers with Contributor-level access or higher to upload arbitrary files to the affected site's server (NVD). The vulnerability has been assigned a critical CVSS score of 9.9, indicating its severe nature (Security Online).

Technical details

The vulnerability is classified as an Unrestricted Upload of File with Dangerous Type (CWE-434). The flaw exists in the plugin's storeUploads function, where the absence of proper file type validation enables attackers to bypass security measures and upload files with dangerous extensions such as .php, .exe, or .sh. The vulnerability has received a CVSS v3.1 base score of 9.9 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H (Wordfence).

Impact

The vulnerability's impact is severe as it can lead to remote code execution (RCE) on affected WordPress sites. Once exploited, attackers can potentially gain full control over the server, leading to data theft of sensitive information, website defacement, system compromise for further attacks, and potential use of the server for malicious purposes such as hosting malware or participating in botnet activities (SecMaster).

Mitigation and workarounds

The primary mitigation is to update the Brizy – Page Builder plugin to version 2.6.5 or later, which contains the security fix. Additional recommended security measures include implementing strict access controls, deploying a Web Application Firewall (WAF) to block dangerous file uploads, regular monitoring of server logs for suspicious activities, and implementing a strict Content Security Policy (CSP) (SecMaster).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13604HIGH7.2
  • security-malware-firewall
NoYesDec 09, 2025
CVE-2025-13642MEDIUM5.4
  • wp-user-avatar
NoYesDec 09, 2025
CVE-2025-13924MEDIUM4.3
  • advanced-product-fields-for-woocommerce
NoYesDec 09, 2025
CVE-2025-13071N/AN/A
  • custom-admin-menu
NoNoDec 09, 2025
CVE-2025-13070N/AN/A
  • csv-to-sorttable
NoNoDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management