Critical WordPress Flaw CVE-2025-6389 Exploited in Wild Attack

Active Exploitation of Critical Sneeit Framework WordPress Plugin Vulnerability and ICTBroadcast DDoS Botnet Deployment

  • A remote code execution vulnerability (CVE-2025-6389) in the Sneeit Framework WordPress plugin is being actively exploited since November 24, 2025.
  • The flaw allows unauthenticated attackers to execute arbitrary PHP functions, potentially creating admin users and backdoors on affected sites.
  • Over 131,000 attack attempts have been blocked, including more than 15,000 in the last 24 hours, targeting sites with Sneeit Framework versions up to 8.3.
  • A critical ICTBroadcast flaw (CVE-2025-2611) is also being exploited to distribute a DDoS botnet called “frost,” designed to launch targeted denial-of-service attacks.
  • The “frost” botnet uses fourteen exploits and activates only when specific HTTP response indicators are found, limiting its spread.

A severe security vulnerability in the Sneeit Framework plugin for WordPress is under active attack, according to data reported by Wordfence. The remote code execution flaw identified as CVE-2025-6389, with a CVSS severity score of 9.8, affects all versions through 8.3 and was patched in version 8.4 released on August 5, 2025. The plugin currently has over 1,700 active installs.

- Advertisement -

The vulnerability stems from the [sneeit_articles_pagination_callback()] function, which improperly processes user input through the PHP function call_user_func(), allowing unauthorized attackers to execute code remotely. This can be leveraged to create malicious administrator accounts or install backdoors, enabling full site takeover. Wordfence noted, “This makes it possible for unauthenticated attackers to execute code on the server, which can be leveraged to inject backdoors or, for example, create new administrative user accounts.”

Since public disclosure on November 24, 2025, more than 131,000 attacks have been blocked, including over 15,000 in just the last 24 hours. Attackers have sent crafted HTTP requests to the “/wp-admin/admin-ajax.php” endpoint to create admin users such as “arudikadis” and upload malicious PHP files like “tijtewmg.php” for backdoor access. The assaults originated from multiple IP addresses including 185.125.50.59, 182.8.226.51, and 89.187.175.80 among others.

Additionally, malicious PHP files found on compromised hosts have varied capabilities such as scanning, file manipulation, and extracting ZIP archives. Files named “xL.php,” “Canonical.php,” “.a.php,” and “simple.php” were observed. The “xL.php” script is downloaded by a helper file exploiting the vulnerability and also retrieves an “.htaccess” file from “racoonlab[.]top” to permit script access on Apache servers, according to Wordfence researcher István Márton.

In a related event, VulnCheck reported exploitation of a critical ICTBroadcast flaw (CVE-2025-2611, CVSS: 9.3) to deliver a distributed denial-of-service (DDoS) botnet named “frost.” The botnet downloads and executes architecture-specific binaries, then deletes traces to evade detection. VulnCheck’s Jacob Baines explained, “The ‘frost’ binary combines DDoS tooling with spreader logic that includes fourteen exploits for fifteen CVEs.” It selectively initiates attacks based on HTTP response indicators like “Set-Cookie: user=(null)” and “Set-Cookie: user=admin” to avoid unnecessary activity.

- Advertisement -

These targeted attacks, launched from IP address 87.121.84.52, focus on fewer than 10,000 internet-facing vulnerable systems, suggesting a relatively small botnet scale. Evidence indicates the attacker possesses additional undisclosed capabilities beyond those visible in the observed exploits.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Nvidia’s OpenAI Investment Could Be Its Last Before IPO

NVIDIA CEO Jensen Huang indicated the company's recent $30 billion investment in OpenAI may...

Bitcoin Outperforms Oil, Gold in US-Iran War Shock

Bitcoin has surged 12.1% since the onset of the US-Israeli conflict with Iran, outperforming...

Tradeweb Leads $31M Crypto Platform Crossover Series B

Tradeweb is leading a $31 million Series B in Crossover Markets, valuing the crypto...

Crypto Stocks Surge After Trump Backs Bitcoin Bill

Coinbase stock surged over 15% after former President Donald Trump expressed support for a...

Kraken Gets Fed Master Account, Banks Cry Foul

Kraken secured a Federal Reserve master account on Wednesday, becoming the first crypto bank...

Must Read

The Ultimate Guide on How to Understand a Cryptocurrency White Paper

Today, cryptocurrency is a popular buzzword. We hear about it on the news, we read about it on the Internet. Yet, people are reluctant to...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!