CVE-2025-6389
CRITICAL EXPLOITEDSneeit Framework <8.3 - RCE
Title source: llmDescription
The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoors or, for example, create new administrative user accounts.
Exploits (6)
github
SUSPICIOUS
2 stars
by exploitChains · pythonpoc
https://github.com/exploitChains/poc-collection/tree/main/CVE-2025-6389
nomisec
WORKING POC
1 stars
by itsismarcos · remote
https://github.com/itsismarcos/SneeitScanner-CVE-2025-6389
Scores
CVSS v3
9.8
EPSS
0.0100
EPSS Percentile
77.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-11-25
CWE
CWE-94
Status
published
Products (1)
Sneeit/Sneeit Framework
< 8.3
Published
Nov 25, 2025
Tracked Since
Feb 18, 2026