Sneeit WordPress Remote Code Execution Vulnerability Lets Hackers Grant Themselves Admin Access – Here’s How to Protect Yourself

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

WordFence Exposes Severe RCE Vulnerability in Sneeit Framework Plugin

  • Critical RCE vulnerability (CVE-2025-6389) identified in the Sneeit Framework plugin, affecting versions ≤8.3.
  • Exploitation enables attackers to create unauthorized admin accounts, install harmful plugins, and seize control of WordPress sites.
  • Users are advised to upgrade to v8.4 and to monitor for rogue admin accounts, dubious PHP files, and malicious AJAX activities

Cybersecurity specialists at WordFence have issued a stern warning regarding a critical vulnerability present in a widely used WordPress plugin, which permits threat actors to elevate themselves to administrator status on WordPress sites.

In a security bulletin released last week, WordFence detailed the discovery of a remote code execution (RCE) flaw within the Sneeit Framework—a backend toolkit employed by WordPress administrators for theme management and feature customization.

This bug, cataloged as CVE-2025-6389, boasts a severity rating of 9.8 out of 10, and jeopardizes all versions of the plugin up to and including 8.3.

The most recent update, version 8.4, launched in early August 2025, rectifies this vulnerability. Reports indicate that the plugin presently supports over 1,700 active installations.

Staying Safe from Exploitation

WordFence elucidated the mechanics behind this vulnerability, explaining that malicious actors can invoke arbitrary PHP functions, enabling them to generate new admin users, thereby facilitating total control over the targeted website.

The implications are severe, as attackers can install harmful plugins, deploy data-mining scripts, redirect users to malicious sites, and create phishing landing pages, among other nefarious activities.

Notably, exploitation attempts commenced immediately upon the vulnerability’s public disclosure. On the first day alone, WordFence thwarted over 131,000 attacks, and even today, daily assault rates hover at approximately 15,000.

The most effective mitigation strategy involves promptly updating the plugin to version 8.4. Users are also encouraged to consistently maintain the WordPress platform, as well as all plugins and themes, in their latest versions. Moreover, any unused components should be purged from the platform.

Webmasters should also remain vigilant for specific indicators of compromise. These include the emergence of unauthorized WordPress admin accounts, created via the vulnerable AJAX callback mechanism.

A man wearing a tshirt with wordpress logo on it and he is typing on a computer.

Another warning sign includes the presence of nefarious PHP files on servers, such as webshells named xL.php, Canonical.php, .a.php, simple.php, or up_sf.php, along with suspicious .htaccess files designed to enable the execution of potentially harmful file types.

Additionally, compromised sites might harbor files such as finderdata.txt or goodfinderdata.txt, which are generated by the attacker’s shell-finder utility.

Log files that record successful AJAX requests originating from known malicious IPs—such as 185.125.50.59, 182.8.226.51, 89.187.175.80, amongst others noted in the report—serve as strong indicators of this vulnerability’s exploitation.

Source link: Techradar.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading