Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6389: CWE-94 Improper Control of Generation of Code ('Code Injection') in Sneeit Sneeit Framework

0
Critical
VulnerabilityCVE-2025-6389cvecve-2025-6389cwe-94
Published: Tue Nov 25 2025 (11/25/2025, 02:26:49 UTC)
Source: CVE Database V5
Vendor/Project: Sneeit
Product: Sneeit Framework

Description

The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoors or, for example, create new administrative user accounts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:34:33 UTC

Technical Analysis

CVE-2025-6389 is a critical remote code execution (RCE) vulnerability in the Sneeit Framework plugin for WordPress, affecting all versions up to and including 8.3. The vulnerability stems from the sneeit_articles_pagination_callback() function, which accepts user-supplied input and passes it unsafely to PHP's call_user_func() function. This improper control of code generation (CWE-94) allows unauthenticated attackers to execute arbitrary PHP code on the server hosting the vulnerable WordPress site. The flaw does not require any authentication or user interaction, making it trivially exploitable remotely over the network. Successful exploitation can lead to full system compromise, including the ability to inject persistent backdoors, modify or delete data, and create new administrative user accounts within WordPress. The vulnerability has been assigned a CVSS v3.1 base score of 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no known public exploits have been reported yet, the nature of the vulnerability and its ease of exploitation make it a high priority for patching. No official patches or updates have been linked yet, so mitigation currently relies on disabling the vulnerable functionality or applying custom code fixes. The vulnerability was reserved in June 2025 and published in November 2025, indicating recent discovery and disclosure. Given the widespread use of WordPress and the Sneeit Framework plugin, this vulnerability poses a significant threat to websites globally.

Potential Impact

The impact of CVE-2025-6389 is severe and wide-ranging. Exploitation allows unauthenticated remote attackers to execute arbitrary code on the web server, leading to complete compromise of the affected WordPress site. This includes the ability to inject persistent backdoors, enabling long-term unauthorized access, data theft, defacement, or use of the compromised server as a pivot point for further attacks within an organization's network. Attackers can also create new administrative user accounts, bypassing all authentication controls and gaining full control over the WordPress environment. The confidentiality, integrity, and availability of the affected systems are all critically impacted. For organizations, this can result in data breaches, loss of customer trust, regulatory penalties, and operational disruptions. Given WordPress's dominance in web content management, many businesses, government agencies, and media outlets are at risk. The vulnerability's ease of exploitation and lack of required privileges or user interaction increase the likelihood of widespread attacks once exploit code becomes publicly available.

Mitigation Recommendations

1. Immediate mitigation should focus on disabling or restricting access to the sneeit_articles_pagination_callback() function if possible, such as by disabling the Sneeit Framework plugin until a patch is available. 2. Monitor web server logs for suspicious requests targeting the vulnerable function or unusual use of call_user_func() patterns. 3. Implement Web Application Firewall (WAF) rules to block or alert on requests containing suspicious payloads targeting this vulnerability. 4. Restrict access to the WordPress admin and plugin directories via IP whitelisting or VPN where feasible. 5. Once an official patch or update is released by the vendor, apply it immediately across all affected systems. 6. Conduct a thorough security audit and malware scan of affected servers to detect and remove any backdoors or unauthorized administrative accounts created prior to patching. 7. Educate site administrators about the risks and signs of compromise related to this vulnerability. 8. Consider deploying runtime application self-protection (RASP) solutions that can detect and block code injection attempts in real time. These steps go beyond generic advice by focusing on immediate containment, detection, and post-exploitation remediation tailored to this specific vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-06-20T02:01:57.382Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692519cd2a08b12b0e7e45f1

Added to database: 11/25/2025, 2:51:57 AM

Last enriched: 2/26/2026, 3:34:33 PM

Last updated: 3/26/2026, 2:12:05 AM

Views: 715

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses