Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51663: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Bricksable Bricksable for Bricks Builder

0
Unknown
VulnerabilityCVE-2024-51663cvecve-2024-51663
Published: Sat Nov 09 2024 (11/09/2024, 13:11:56 UTC)
Source: CVE Database V5
Vendor/Project: Bricksable
Product: Bricksable for Bricks Builder

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bricksable Bricksable for Bricks Builder bricksable allows Stored XSS.This issue affects Bricksable for Bricks Builder: from n/a through <= 1.6.59.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 07:54:07 UTC

Technical Analysis

CVE-2024-51663 is a stored cross-site scripting (XSS) vulnerability affecting Bricksable for Bricks Builder, a plugin used within the Bricks Builder WordPress environment. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be stored persistently on the affected site. When a victim visits a compromised page, the injected script executes in their browser context, potentially enabling attackers to steal cookies, session tokens, or perform actions on behalf of the user. The affected versions include all releases up to and including 1.6.59. No authentication or special user privileges are required to exploit this vulnerability, and user interaction is limited to visiting a malicious or compromised page. While no public exploits have been reported yet, the nature of stored XSS makes it a critical concern for websites using this plugin, especially those with high traffic or sensitive user data. The vulnerability was published on November 9, 2024, and no CVSS score has been assigned. The lack of a patch link indicates that a fix may not yet be available, underscoring the need for immediate mitigation measures. This vulnerability is particularly relevant to organizations using WordPress with the Bricks Builder ecosystem, which is popular among web developers for building custom websites.

Potential Impact

The impact of CVE-2024-51663 is significant for organizations using Bricksable for Bricks Builder. Successful exploitation can lead to the compromise of user credentials, session hijacking, and unauthorized actions performed with the victim's privileges, undermining both confidentiality and integrity. This can result in data breaches, defacement, or further malware distribution. The stored nature of the XSS means the malicious payload persists on the site, increasing the risk to all visitors. For e-commerce, financial, or healthcare websites, this could lead to severe reputational damage and regulatory consequences. The vulnerability also threatens website availability indirectly by enabling attackers to inject disruptive scripts. Since no authentication is required, attackers can exploit this vulnerability at scale, potentially affecting large user bases. Organizations worldwide that rely on Bricksable for Bricks Builder for their web presence are at risk, especially those with high visitor volumes or sensitive user interactions.

Mitigation Recommendations

1. Monitor official Bricksable and Bricks Builder channels for security patches and apply updates immediately once available. 2. Implement strict input validation and sanitization on all user inputs, especially those that are rendered on web pages. 3. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 4. Use Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting Bricksable components. 5. Conduct regular security audits and penetration testing focusing on plugin vulnerabilities and input handling. 6. Educate site administrators and developers on secure coding practices and the risks of stored XSS. 7. Temporarily disable or restrict the use of Bricksable for Bricks Builder if patching is not immediately possible, especially on high-risk or sensitive sites. 8. Monitor web server and application logs for unusual activities indicative of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-30T15:05:26.590Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7510e6bfc5ba1df028f8

Added to database: 4/1/2026, 7:42:08 PM

Last enriched: 4/2/2026, 7:54:07 AM

Last updated: 4/6/2026, 9:33:26 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses