[ad_1]
In style WordPress theme builder Bricks Builder has launched an pressing safety replace patching a vital distant code execution (RCE) vulnerability in its platform.
The vulnerability might permit attackers to execute arbitrary PHP code on Bricks-powered web sites. If exploited, this may successfully hand management of the location over to hackers.
The Bricks group was alerted to the difficulty by a outstanding WordPress safety professional and instantly ready patch 1.9.6.1. The corporate is strongly advising all customers to put in the replace inside 24 hours to guard their websites.
Whereas there is no such thing as a proof this flaw has been actively exploited but, the window of publicity grows the longer customers delay updating. Bricks is being abundantly cautious in its dealing with of the difficulty. The replace could be put in through the WordPress dashboard like a traditional plugin replace.
Customers are warned that restoring backups might reintroduce the weak code in the event that they predate 1.9.6.1.
Consumer Suggestions on the Replace Course of
The safety replace prompted dialogue throughout the Bricks Fb group group as customers labored to grasp the difficulty and replace their websites.
A number of customers expressed appreciation for the pressing, clear communication from Thomas Ehrig. Nonetheless, some questions lingered across the specifics of the vulnerability itself and what variations have been affected.
A number of customers additionally reported minor technical points that quickly hindered easy updating for some. This included inconsistencies with replace notifications within the WordPress dashboard and challenges downloading the patch file manually.
[ad_2]