Remote Code Execution Vulnerability in Sneeit Framework Plugin for WordPress
CVE-2025-6389

9.8CRITICAL

Key Information:

Vendor

WordPress

Vendor
CVE Published:
25 November 2025

Badges

πŸ“ˆ Score: 405πŸ‘Ύ Exploit Exists🟑 Public PoC

What is CVE-2025-6389?

CVE-2025-6389 is a serious vulnerability found within the Sneeit Framework plugin for WordPress. This plugin is designed to enhance content management functionalities, allowing WordPress users to better organize and display articles on their websites. The vulnerability centers around a flaw in the sneeit_articles_pagination_callback() function, which fails to properly validate user input. As a result, it permits unauthenticated users to execute arbitrary code on the server through the use of the call_user_func() function. This could allow attackers to inject malicious code, potentially leading to disastrous outcomes such as unauthorized access to administrative features, installation of backdoors, or complete control over the affected systems.

Potential impact of CVE-2025-6389

  1. Unauthorized Access and Control: Attackers can leverage this vulnerability to gain unauthorized control over the WordPress installation, enabling them to create administrative accounts or modify site content as they see fit.

  2. Malware and Backdoor Installation: Successful exploitation may result in the installation of malicious payloads or backdoors, permitting ongoing access to the compromised systems for further exploitation or data theft.

  3. Reputation and Financial Damage: Organizations affected by this vulnerability may suffer reputational harm due to security breaches, alongside potential financial losses from data recovery efforts, legal issues, or loss of customer trust.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Sneeit Framework * <= 8.3

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Tonn
.