CVE-2025-6389

Received
Published: 25 Nov 2025, 03:15
Last modified:25 Nov 2025, 03:15

Vulnerability Summary

Overall Risk
Medium Risk
39/100
AI Analysis
Emergency
Requires Immediate Action
CVSS Score
9.8 CRITICAL
CVSS v3.1 (SECURITY)
EPSS Score
0.25% INFO
0% probability
CISA KEV
Not listed
Ransomware
No reports
Exploits
None found
Dark Web
Activity detected
Telegram
The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoors or, for example, create new administrative user accounts.
Source Identifier: security@wordfence.com
CVSSSourceSeverityExploit.ImpactVector
v4.0n/a
v3.1Primarysecurity@wordfence.com9.8 CRITICAL3.95.9
CVSS:3.1/AV:N/AC:L/PR:N/U...
v3.0n/a
v2.0n/a
0.25%
Current Score
49%ile
Percentile Rank
Loading chart...
Loading chart...
Improper Control of Generation of Code ('Code Injection') CWE-94
Description:The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

Not listed in CISA Known Exploited Vulnerabilities catalog.

Telegram Activity Detected
This vulnerability has been mentioned in monitored Telegram channels, indicating potential threat actor interest.

No known public exploit code indexed (as of 25 Nov 2025, 03:15).

Exploitation status can change quickly once PoC code appears.

No affected systems information available.

© 2025 CveMate. All rights reserved.v0.1.4