CVE-2025-6389

CRITICAL EXPLOITED

Sneeit Framework <8.3 - RCE

Title source: llm

Description

The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoors or, for example, create new administrative user accounts.

Exploits (6)

github SUSPICIOUS 2 stars
by exploitChains · pythonpoc
https://github.com/exploitChains/poc-collection/tree/main/CVE-2025-6389
nomisec WORKING POC 1 stars
by itsismarcos · remote
https://github.com/itsismarcos/SneeitScanner-CVE-2025-6389
nomisec WORKING POC
by Nxploited · poc
https://github.com/Nxploited/CVE-2025-6389
nomisec WORKING POC
by shac1x · poc
https://github.com/shac1x/Blackash-CVE-2025-6389
nomisec WORKING POC
by aritlhq · poc
https://github.com/aritlhq/Blackash-CVE-2025-6389

Scores

CVSS v3 9.8
EPSS 0.0100
EPSS Percentile 77.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2025-11-25
CWE
CWE-94
Status published
Products (1)
Sneeit/Sneeit Framework < 8.3
Published Nov 25, 2025
Tracked Since Feb 18, 2026