WordPress developers and site administrators using Bricks Builder are urged to update immediately following the discovery of a critical SQL injection vulnerability affecting versions up to 1.12.4.
Vulnerability Overview
The security flaw, designated as CVE-2025-6495, represents a time-based/blind SQL injection vulnerability that can be exploited without authentication through the ‘p’ parameter. This vulnerability is highly dangerous and expected to become mass exploited, according to security researchers at Patchstack who first identified the issue.
Unlike traditional SQL injection attacks that allow direct database access, this vulnerability requires more sophisticated exploitation techniques. Exploitation requires indirect techniques to extract data (e.g., using time-based conditions to infer information), making it complex and impractical in most real-world environments, as confirmed by the Bricks development team.
Technical Details
The vulnerability specifically affects the way Bricks Builder handles the ‘p’ parameter in database queries. While the exact technical implementation details remain limited to prevent exploitation, the flaw allows unauthenticated attackers to potentially extract sensitive information from the database through time-based inference techniques.
Security experts note that SQL Injection: Hackers can test different SQL injection techniques to exploit weak database security, particularly with AI-driven attacks becoming more sophisticated in 2025.
Immediate Action Required
Bricks Builder has released patches addressing this vulnerability:

- Primary Solution: Update to Bricks 2.0 or above – the major release includes comprehensive security improvements along with the vulnerability patch
- Alternative Option: For sites not ready for the 2.0 upgrade, Bricks 1.12.5 is available with the security patch
The development team emphasizes: “Please update all your Bricks sites to version 2.0 or above as Bricks 2.0 contains a security patch!“
No Evidence of Active Exploitation
Despite the critical nature of the vulnerability, both Wordfence threat intelligence and the Bricks development team report no evidence of real-world exploitation has been observed. The complexity required for successful exploitation has likely deterred widespread attacks.
Historical Context: Bricks Builder’s Security Journey
This disclosure comes nearly a year after Bricks Builder faced another critical security challenge. In February 2024, CVE-2024-25600, is described as a remote code execution (RCE) flaw that can be exploited without authentication to execute arbitrary PHP code, which led to active exploitation and site compromises.
The previous RCE vulnerability was far more severe, allowing attackers to completely take over websites. Attackers targeting CVE-2024-25600 have been spotted using malware designed to disable WordPress security plugins, according to security researchers.
Why This Matters for WordPress Developers
SQL injection vulnerabilities remain among the most critical web security threats. SQL injection in WordPress is ranked as the second most critical vulnerability, posing a severe risk for website owners. The vulnerability is particularly concerning because:
- No Authentication Required: Attackers don’t need login credentials
- Wide Attack Surface: Affects all sites using vulnerable Bricks versions
- Plugin Ecosystem Risk: According to Wordfence, 52% of related vulnerabilities reported were WordPress plugins
Best Practices for WordPress Security
This incident highlights the importance of:
- Immediate Updates: Apply security patches as soon as they’re available
- Regular Monitoring: Use security plugins like Wordfence or Sucuri for real-time protection
- Backup Strategy: Maintain current backups before major updates
- Security Audits: Regular vulnerability assessments for custom themes and plugins
Bricks 2.0: More Than Just a Security Update
Beyond addressing the security vulnerability, Bricks 2.0 represents a significant milestone for the popular page builder. The development team notes: “We are very pleased with the reception of Bricks 2.0. Especially considering the magnitude and number of all the changes.”
The decision to delay disclosure until after the 2.0 release demonstrates responsible vulnerability management, giving users time to upgrade before drawing attention to the security aspect.
Conclusion
While the CVE-2025-6495 SQL injection vulnerability in Bricks Builder is technically complex to exploit, its critical severity rating demands immediate attention. The WordPress community’s rapid response – with patches available across multiple versions – exemplifies effective security collaboration.
Site administrators should prioritize updating to Bricks 2.0 or at minimum version 1.12.5 to ensure protection against this and future vulnerabilities.
For detailed technical information about this vulnerability, refer to the official Wordfence threat intelligence report.