{"id":35401,"date":"2024-02-20T08:53:49","date_gmt":"2024-02-20T07:53:49","guid":{"rendered":"https:\/\/quike.it\/es\/?p=35401"},"modified":"2024-02-20T08:53:49","modified_gmt":"2024-02-20T07:53:49","slug":"hackers-aprovechan-falla-rce-en-bricks-de-wordpress","status":"publish","type":"post","link":"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/","title":{"rendered":"Hackers Aprovechan Falla RCE en Bricks de WordPress"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"35401\" class=\"elementor elementor-35401\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-edc2043 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"edc2043\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-28c9cfe\" data-id=\"28c9cfe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee098f8 elementor-widget elementor-widget-text-editor\" data-id=\"ee098f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Los <em><strong>piratas inform\u00e1ticos<\/strong><\/em> est\u00e1n actualmente explotando una vulnerabilidad cr\u00edtica de <strong>ejecuci\u00f3n remota de c\u00f3digo<\/strong> (falla <em><strong>RCE<\/strong><\/em>) en el tema <strong>Bricks Builder<\/strong>, lo que les permite ejecutar <strong>c\u00f3digo PHP<\/strong> malicioso en sitios vulnerables.<\/p><p><strong>Bricks Builder<\/strong> es un tema <em>premium<\/em> de <strong>WordPress<\/strong> conocido como un innovador constructor visual de sitios respaldado por la comunidad, con alrededor de <strong>25,000 instalaciones activas<\/strong>.<\/p><p>Destaca por su facilidad de uso y personalizaci\u00f3n en el dise\u00f1o de <strong>sitios web<\/strong>.<\/p><p>El <strong>10 de febrero<\/strong>, el investigador <em><strong>&#8216;snicco&#8217;<\/strong><\/em> descubri\u00f3 una vulnerabilidad, rastreada como <strong>CVE-2024-25600<\/strong>, que afecta al tema <strong>Bricks Builder<\/strong> en su configuraci\u00f3n predeterminada.<\/p><p>La vulnerabilidad radica en una llamada de funci\u00f3n <em><strong>&#8216;eval&#8217;<\/strong><\/em> en la funci\u00f3n <em><strong>&#8216;prepare_query_vars_from_settings&#8217;,<\/strong><\/em> que un usuario no autenticado podr\u00eda explotar para ejecutar <strong>c\u00f3digo PHP<\/strong> arbitrario.<\/p><p>El equipo de <strong>Bricks<\/strong> fue notificado a trav\u00e9s de la plataforma <em><strong>Patchstack,<\/strong><\/em> y lanz\u00f3 una correcci\u00f3n el <strong>13 de febrero<\/strong> con la versi\u00f3n <strong>1.9.6.1.<\/strong><\/p><p>Aunque no hab\u00eda evidencia de explotaci\u00f3n hasta la fecha de la versi\u00f3n, el desarrollador inst\u00f3 a los usuarios a actualizar lo antes posible, dado que el riesgo aumenta con el tiempo.<\/p><p>\u00ab<em><strong>Actualice todos sus sitios de Bricks a la \u00faltima versi\u00f3n 1.9.6.1 lo antes posible, preferiblemente dentro de las pr\u00f3ximas 24 horas<\/strong><\/em>\u00ab, <a href=\"https:\/\/bricksbuilder.io\/release\/bricks-1-9-6-1\/\" target=\"_blank\" rel=\"noopener\"><strong>recomend\u00f3 el equipo de Bricks<\/strong><\/a>.<\/p><p>El investigador <strong><em>&#8216;snicco&#8217;<\/em><\/strong> proporcion\u00f3 detalles sobre la vulnerabilidad el mismo d\u00eda y <a href=\"https:\/\/snicco.io\/vulnerability-disclosure\/bricks\/unauthenticated-rce-in-bricks-1-9-6\" target=\"_blank\" rel=\"noopener\"><strong>recientemente actualiz\u00f3 su informe<\/strong><\/a> para incluir una demostraci\u00f3n del ataque, aunque sin compartir el c\u00f3digo de explotaci\u00f3n.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58e3bff elementor-grid-1 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"58e3bff\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;30519&quot;,&quot;columns&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t<style id=\"loop-30519\">.elementor-30519 .elementor-element.elementor-element-98493d2 .elementor-column-gap-custom .elementor-column > .elementor-element-populated{padding:2px;}.elementor-30519 .elementor-element.elementor-element-ccee508 > .elementor-widget-wrap > .elementor-widget:not(.elementor-widget__width-auto):not(.elementor-widget__width-initial):not(:last-child):not(.elementor-absolute){--kit-widget-spacing:1px;}.elementor-widget-image .widget-image-caption{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-30519 .elementor-element.elementor-element-80149f2 img{height:85px;object-fit:cover;object-position:center center;}.elementor-30519 .elementor-element.elementor-element-80149f2:not( .elementor-widget-image ), .elementor-30519 .elementor-element.elementor-element-80149f2.elementor-widget-image img{-webkit-mask-image:url( https:\/\/quike.it\/es\/wp-content\/plugins\/elementor\/assets\/mask-shapes\/circle.svg );-webkit-mask-size:contain;-webkit-mask-position:center center;-webkit-mask-repeat:no-repeat;}.elementor-30519 .elementor-element.elementor-element-2109b1e > .elementor-widget-wrap > .elementor-widget:not(.elementor-widget__width-auto):not(.elementor-widget__width-initial):not(:last-child):not(.elementor-absolute){--kit-widget-spacing:3px;}.elementor-widget-post-info .elementor-icon-list-item{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-icon{width:17px;}.elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-icon i{font-size:17px;}.elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-icon svg{--e-icon-list-icon-size:17px;}body:not(.rtl) .elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-text{padding-left:5px;}body.rtl .elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-text{padding-right:5px;}.elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-item{font-family:\"Work Sans\", Sans-serif;font-weight:600;text-transform:uppercase;word-spacing:0px;}.elementor-30519 .elementor-element.elementor-element-26a68f7{width:100%;max-width:100%;align-self:center;}.elementor-widget-heading .elementor-heading-title{font-family:var( --e-global-typography-primary-font-family ), Sans-serif;font-weight:var( --e-global-typography-primary-font-weight );}.elementor-30519 .elementor-element.elementor-element-1ed9e84 .elementor-heading-title{font-family:\"Roboto\", Sans-serif;font-weight:600;color:#000000;}.elementor-widget-icon-list .elementor-icon-list-item > .elementor-icon-list-text, .elementor-widget-icon-list .elementor-icon-list-item > a{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-icon i{color:#000000;transition:color 0.3s;}.elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-icon svg{fill:#000000;transition:fill 0.3s;}.elementor-30519 .elementor-element.elementor-element-714486b{--e-icon-list-icon-size:13px;--e-icon-list-icon-align:left;--e-icon-list-icon-margin:0 calc(var(--e-icon-list-icon-size, 1em) * 0.25) 0 0;--icon-vertical-align:center;--icon-vertical-offset:0px;margin:0px 0px calc(var(--kit-widget-spacing, 0px) + 0px) 0px;padding:0px 0px 0px 0px;width:100%;max-width:100%;}.elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-item > .elementor-icon-list-text, .elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-item > a{font-family:\"Work Sans\", Sans-serif;font-size:11px;font-weight:500;text-transform:capitalize;line-height:16px;letter-spacing:1px;}.elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-text{color:#333333;transition:color 0.3s;}.elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-icon i{color:#000000;transition:color 0.3s;}.elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-icon svg{fill:#000000;transition:fill 0.3s;}.elementor-30519 .elementor-element.elementor-element-0a32de7{--e-icon-list-icon-size:13px;--e-icon-list-icon-align:left;--e-icon-list-icon-margin:0 calc(var(--e-icon-list-icon-size, 1em) * 0.25) 0 0;--icon-vertical-align:center;--icon-vertical-offset:0px;margin:0px 0px calc(var(--kit-widget-spacing, 0px) + 0px) 0px;padding:0px 0px 0px 0px;width:100%;max-width:100%;}.elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-item > .elementor-icon-list-text, .elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-item > a{font-family:\"Work Sans\", Sans-serif;font-size:11px;font-weight:500;text-transform:capitalize;line-height:16px;letter-spacing:1px;}.elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-text{color:#333333;transition:color 0.3s;}@media(min-width:768px){.elementor-30519 .elementor-element.elementor-element-ccee508{width:20%;}.elementor-30519 .elementor-element.elementor-element-2109b1e{width:79.997%;}}@media(max-width:767px){.elementor-30519 .elementor-element.elementor-element-98493d2 .elementor-column-gap-custom .elementor-column > .elementor-element-populated{padding:2px;}.elementor-30519 .elementor-element.elementor-element-ccee508{width:25%;}.elementor-30519 .elementor-element.elementor-element-2109b1e{width:75%;}.elementor-30519 .elementor-element.elementor-element-1ed9e84 .elementor-heading-title{font-size:15px;}}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"30519\" class=\"elementor elementor-30519 e-loop-item e-loop-item-33835 post-33835 post type-post status-publish format-standard has-post-thumbnail hentry category-noticias category-web category-wordpress\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98493d2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"98493d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ccee508\" data-id=\"ccee508\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80149f2 elementor-widget elementor-widget-image\" data-id=\"80149f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/vulnerabilidad-en-plugin-wordpress-en-riesgo-50-000-sitios-web\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1280\" height=\"682\" src=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2022\/06\/wordpress-581849_1280.jpg\" class=\"attachment-full size-full wp-image-12638\" alt=\"\" srcset=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2022\/06\/wordpress-581849_1280.jpg 1280w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2022\/06\/wordpress-581849_1280-300x160.jpg 300w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2022\/06\/wordpress-581849_1280-1024x546.jpg 1024w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2022\/06\/wordpress-581849_1280-768x409.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2109b1e\" data-id=\"2109b1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26a68f7 elementor-align-left elementor-widget__width-inherit elementor-widget elementor-widget-post-info\" data-id=\"26a68f7\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"categorias-post\" data-widget_type=\"post-info.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-dfd774d elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/category\/general\/noticias\/\" rel=\"tag\">Noticias<\/a> <a href=\"https:\/\/quike.it\/es\/category\/web\/\" rel=\"tag\">WEB<\/a> <a href=\"https:\/\/quike.it\/es\/category\/web\/wordpress\/\" rel=\"tag\">WordPress<\/a>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ed9e84 elementor-widget elementor-widget-heading\" data-id=\"1ed9e84\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"top-post\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/quike.it\/es\/vulnerabilidad-en-plugin-wordpress-en-riesgo-50-000-sitios-web\/\" target=\"_blank\">Vulnerabilidad en Plugin de WordPress, en Riesgo 50.000 Sitios Web<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-714486b elementor-icon-list--layout-inline elementor-align-start elementor-hidden-tablet elementor-hidden-mobile elementor-widget__width-inherit elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"714486b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/vulnerabilidad-en-plugin-wordpress-en-riesgo-50-000-sitios-web\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">104 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/vulnerabilidad-en-plugin-wordpress-en-riesgo-50-000-sitios-web\/#respond\">sin comentarios<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a32de7 elementor-icon-list--layout-inline elementor-align-start elementor-widget__width-inherit elementor-hidden-desktop elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0a32de7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/vulnerabilidad-en-plugin-wordpress-en-riesgo-50-000-sitios-web\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">104 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/vulnerabilidad-en-plugin-wordpress-en-riesgo-50-000-sitios-web\/#respond\">0<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-339f5ce elementor-widget elementor-widget-heading\" data-id=\"339f5ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Lo que est\u00e1 sucediendo<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3de02af elementor-widget elementor-widget-text-editor\" data-id=\"3de02af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>En su <a href=\"https:\/\/patchstack.com\/articles\/critical-rce-patched-in-bricks-builder-theme\/\" target=\"_blank\" rel=\"noopener\"><strong>\u00faltima actualizaci\u00f3n, <em>Patchstack<\/em><\/strong><\/a> detall\u00f3 completamente el <strong>CVE-2024-25600<\/strong>, tras detectar intentos activos de explotaci\u00f3n a partir del <strong>14 de febrero<\/strong>.<\/p><p>La vulnerabilidad proviene de la ejecuci\u00f3n de entrada controlada por el usuario a trav\u00e9s de la funci\u00f3n <strong><em>eval<\/em><\/strong> en <strong><em>&#8216;prepare_query_vars_from_settings&#8217;,<\/em><\/strong> donde <strong><em>$php_query_raw<\/em><\/strong> se construye a partir de <strong><em>&#8216;queryEditor&#8217;.<\/em><\/strong><\/p><p>La explotaci\u00f3n de este riesgo de seguridad es viable mediante puntos finales de la <strong>API REST<\/strong> para el renderizado en el servidor.<\/p><p>A pesar de una verificaci\u00f3n de nonce en <em><strong>&#8216;render_element_permissions_check&#8217;,<\/strong><\/em> se debe a los nonces p\u00fablicamente accesibles y controles de permisos inadecuados que permiten el acceso no autenticado.<\/p><p>En la fase de <em><strong>post-explotaci\u00f3n,<\/strong> <strong>Patchstack<\/strong><\/em> ha observado que los atacantes utilizan <a href=\"https:\/\/quike.it\/es\/como-eliminar-malware-de-tu-computadora\/\" target=\"_blank\" rel=\"noopener\"><strong>malware<\/strong><\/a> espec\u00edfico capaz de desactivar plugins de seguridad como <strong>Wordfence<\/strong> y <strong>Sucuri.<\/strong><\/p><p>Las siguientes <a href=\"https:\/\/quike.it\/es\/como-se-asigna-la-ip-publica-cuando-nos-conectamos-a-internet\/\" target=\"_blank\" rel=\"noopener\"><strong>direcciones IP<\/strong><\/a> han sido asociadas con la mayor\u00eda de los ataques:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97b453f elementor-widget elementor-widget-text-editor\" data-id=\"97b453f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><em><strong>200.251.23.57<\/strong><\/em><\/li><li><em><strong>92.118.170.216<\/strong><\/em><\/li><li><em><strong>103.187.5.128<\/strong><\/em><\/li><li><em><strong>149.202.55.79<\/strong><\/em><\/li><li><em><strong>5.252.118.211<\/strong><\/em><\/li><li><em><strong>1.108.240.52<\/strong><\/em><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f8dc52 elementor-widget elementor-widget-text-editor\" data-id=\"0f8dc52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.wordfence.com\/threat-intel\/vulnerabilities\/wordpress-themes\/bricks\/bricks-196-unauthenticated-remote-code-execution\" target=\"_blank\" rel=\"noopener\"><strong>Wordfence tambi\u00e9n ha confirmado<\/strong><\/a> la activa explotaci\u00f3n del <strong>CVE-2024-25600<\/strong> y ha informado haber detectado <strong>24 instancias<\/strong> en el \u00faltimo d\u00eda.<\/p><p>Se insta a los usuarios de <strong>Bricks<\/strong> a que actualicen a la <strong>versi\u00f3n 1.9.3.1<\/strong> de inmediato.<\/p><p>Pueden hacerlo a trav\u00e9s de \u00ab<em><strong>Apariencia -&gt; Temas<\/strong><\/em>\u00bb en el panel de control de <strong>WordPress,<\/strong> haciendo clic en <em><strong>\u00abActualizar\u00bb,<\/strong><\/em> o de manera manual desde <a href=\"https:\/\/my.bricksbuilder.io\/\" target=\"_blank\" rel=\"noopener\"><strong>este enlace<\/strong><\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Los piratas inform\u00e1ticos est\u00e1n actualmente explotando una vulnerabilidad cr\u00edtica de ejecuci\u00f3n remota de c\u00f3digo (falla RCE) en el tema Bricks Builder, lo que les permite ejecutar c\u00f3digo PHP malicioso en sitios vulnerables. Bricks Builder es un tema premium de WordPress conocido como un innovador constructor visual de sitios respaldado por la comunidad, con alrededor de [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":35403,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[89,45],"tags":[],"class_list":["post-35401","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad","category-wordpress"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Aprovechan Falla RCE en Bricks de WordPress<\/title>\n<meta name=\"description\" content=\"Los piratas inform\u00e1ticos est\u00e1n explotando una vulnerabilidad cr\u00edtica de ejecuci\u00f3n remota de c\u00f3digo (falla RCE) en el tema Bricks Builder...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Aprovechan Falla RCE en Bricks de WordPress\" \/>\n<meta property=\"og:description\" content=\"Los piratas inform\u00e1ticos est\u00e1n explotando una vulnerabilidad cr\u00edtica de ejecuci\u00f3n remota de c\u00f3digo (falla RCE) en el tema Bricks Builder...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/\" \/>\n<meta property=\"og:site_name\" content=\"El BLOG de Enrique V\u00e1squez B.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/zeven.sa.1\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/zeven.sa.1\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-20T07:53:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/WordPress_Alert.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Enrique V\u00e1squez B.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@quike1974\" \/>\n<meta name=\"twitter:site\" content=\"@quike1974\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enrique V\u00e1squez B.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\\\/\"},\"author\":{\"name\":\"Enrique V\u00e1squez B.\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#\\\/schema\\\/person\\\/e53c62e8ab2e3f878e77d3a617483cc8\"},\"headline\":\"Hackers Aprovechan Falla RCE en Bricks de WordPress\",\"datePublished\":\"2024-02-20T07:53:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\\\/\"},\"wordCount\":488,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#\\\/schema\\\/person\\\/e53c62e8ab2e3f878e77d3a617483cc8\"},\"image\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/02\\\/WordPress_Alert.png\",\"articleSection\":[\"Seguridad\",\"WordPress\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/quike.it\\\/es\\\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\\\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\\\/\",\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\\\/\",\"name\":\"Hackers Aprovechan Falla RCE en Bricks de WordPress\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/02\\\/WordPress_Alert.png\",\"datePublished\":\"2024-02-20T07:53:49+00:00\",\"description\":\"Los piratas inform\u00e1ticos est\u00e1n explotando una vulnerabilidad cr\u00edtica de ejecuci\u00f3n remota de c\u00f3digo (falla RCE) en el tema Bricks Builder...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/quike.it\\\/es\\\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\\\/#primaryimage\",\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/02\\\/WordPress_Alert.png\",\"contentUrl\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/02\\\/WordPress_Alert.png\",\"width\":1120,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/quike.it\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Inform\u00e1tica\",\"item\":\"https:\\\/\\\/quike.it\\\/es\\\/category\\\/informatica\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Seguridad\",\"item\":\"https:\\\/\\\/quike.it\\\/es\\\/category\\\/informatica\\\/seguridad\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Hackers Aprovechan Falla RCE en Bricks de WordPress\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/\",\"name\":\"El BLOG de Enrique V\u00e1squez B.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#\\\/schema\\\/person\\\/e53c62e8ab2e3f878e77d3a617483cc8\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/quike.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#\\\/schema\\\/person\\\/e53c62e8ab2e3f878e77d3a617483cc8\",\"name\":\"Enrique V\u00e1squez B.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/02\\\/me.png\",\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/02\\\/me.png\",\"contentUrl\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/02\\\/me.png\",\"width\":512,\"height\":512,\"caption\":\"Enrique V\u00e1squez B.\"},\"logo\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/02\\\/me.png\"},\"description\":\"Programador desde 1988, con pasi\u00f3n por escribir art\u00edculos de todo tipo. Actualmente desarrolla para ZEVEN S.A. el Sistema de Facturaci\u00f3n Electr\u00f3nica. Ecuatoriano de nacimiento e italiano de residencia, escribe desde G\u00e9nova, ciudad que ha llegado a amar tanto como su natal Guayaquil. Padre de dos hijos que son su orgullo y esposo de una mujer excepcional.\",\"sameAs\":[\"https:\\\/\\\/quike.it\",\"https:\\\/\\\/www.facebook.com\\\/zeven.sa.1\",\"https:\\\/\\\/www.instagram.com\\\/quikev1974\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/carlos-enrique-vasquez-bautista-074893b\\\/\",\"https:\\\/\\\/x.com\\\/quike1974\"],\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/author\\\/quike\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Aprovechan Falla RCE en Bricks de WordPress","description":"Los piratas inform\u00e1ticos est\u00e1n explotando una vulnerabilidad cr\u00edtica de ejecuci\u00f3n remota de c\u00f3digo (falla RCE) en el tema Bricks Builder...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/","og_locale":"es_ES","og_type":"article","og_title":"Hackers Aprovechan Falla RCE en Bricks de WordPress","og_description":"Los piratas inform\u00e1ticos est\u00e1n explotando una vulnerabilidad cr\u00edtica de ejecuci\u00f3n remota de c\u00f3digo (falla RCE) en el tema Bricks Builder...","og_url":"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/","og_site_name":"El BLOG de Enrique V\u00e1squez B.","article_publisher":"https:\/\/www.facebook.com\/zeven.sa.1","article_author":"https:\/\/www.facebook.com\/zeven.sa.1","article_published_time":"2024-02-20T07:53:49+00:00","og_image":[{"width":1120,"height":600,"url":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/WordPress_Alert.png","type":"image\/png"}],"author":"Enrique V\u00e1squez B.","twitter_card":"summary_large_image","twitter_creator":"@quike1974","twitter_site":"@quike1974","twitter_misc":{"Escrito por":"Enrique V\u00e1squez B.","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/#article","isPartOf":{"@id":"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/"},"author":{"name":"Enrique V\u00e1squez B.","@id":"https:\/\/quike.it\/es\/#\/schema\/person\/e53c62e8ab2e3f878e77d3a617483cc8"},"headline":"Hackers Aprovechan Falla RCE en Bricks de WordPress","datePublished":"2024-02-20T07:53:49+00:00","mainEntityOfPage":{"@id":"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/"},"wordCount":488,"commentCount":0,"publisher":{"@id":"https:\/\/quike.it\/es\/#\/schema\/person\/e53c62e8ab2e3f878e77d3a617483cc8"},"image":{"@id":"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/#primaryimage"},"thumbnailUrl":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/WordPress_Alert.png","articleSection":["Seguridad","WordPress"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/","url":"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/","name":"Hackers Aprovechan Falla RCE en Bricks de WordPress","isPartOf":{"@id":"https:\/\/quike.it\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/#primaryimage"},"image":{"@id":"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/#primaryimage"},"thumbnailUrl":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/WordPress_Alert.png","datePublished":"2024-02-20T07:53:49+00:00","description":"Los piratas inform\u00e1ticos est\u00e1n explotando una vulnerabilidad cr\u00edtica de ejecuci\u00f3n remota de c\u00f3digo (falla RCE) en el tema Bricks Builder...","breadcrumb":{"@id":"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/#primaryimage","url":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/WordPress_Alert.png","contentUrl":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/WordPress_Alert.png","width":1120,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/quike.it\/es\/"},{"@type":"ListItem","position":2,"name":"Inform\u00e1tica","item":"https:\/\/quike.it\/es\/category\/informatica\/"},{"@type":"ListItem","position":3,"name":"Seguridad","item":"https:\/\/quike.it\/es\/category\/informatica\/seguridad\/"},{"@type":"ListItem","position":4,"name":"Hackers Aprovechan Falla RCE en Bricks de WordPress"}]},{"@type":"WebSite","@id":"https:\/\/quike.it\/es\/#website","url":"https:\/\/quike.it\/es\/","name":"El BLOG de Enrique V\u00e1squez B.","description":"","publisher":{"@id":"https:\/\/quike.it\/es\/#\/schema\/person\/e53c62e8ab2e3f878e77d3a617483cc8"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/quike.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":["Person","Organization"],"@id":"https:\/\/quike.it\/es\/#\/schema\/person\/e53c62e8ab2e3f878e77d3a617483cc8","name":"Enrique V\u00e1squez B.","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2021\/02\/me.png","url":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2021\/02\/me.png","contentUrl":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2021\/02\/me.png","width":512,"height":512,"caption":"Enrique V\u00e1squez B."},"logo":{"@id":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2021\/02\/me.png"},"description":"Programador desde 1988, con pasi\u00f3n por escribir art\u00edculos de todo tipo. Actualmente desarrolla para ZEVEN S.A. el Sistema de Facturaci\u00f3n Electr\u00f3nica. Ecuatoriano de nacimiento e italiano de residencia, escribe desde G\u00e9nova, ciudad que ha llegado a amar tanto como su natal Guayaquil. Padre de dos hijos que son su orgullo y esposo de una mujer excepcional.","sameAs":["https:\/\/quike.it","https:\/\/www.facebook.com\/zeven.sa.1","https:\/\/www.instagram.com\/quikev1974","https:\/\/www.linkedin.com\/in\/carlos-enrique-vasquez-bautista-074893b\/","https:\/\/x.com\/quike1974"],"url":"https:\/\/quike.it\/es\/author\/quike\/"}]}},"_links":{"self":[{"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/posts\/35401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/comments?post=35401"}],"version-history":[{"count":11,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/posts\/35401\/revisions"}],"predecessor-version":[{"id":35414,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/posts\/35401\/revisions\/35414"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/media\/35403"}],"wp:attachment":[{"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/media?parent=35401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/categories?post=35401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/tags?post=35401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}