BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Critical WordPress Flaw CVE-2025-6389 Exploited in Wild Attack

Active Exploitation of Critical Sneeit Framework WordPress Plugin Vulnerability and ICTBroadcast DDoS Botnet Deployment

  • A remote code execution vulnerability (CVE-2025-6389) in the Sneeit Framework WordPress plugin is being actively exploited since November 24, 2025.
  • The flaw allows unauthenticated attackers to execute arbitrary PHP functions, potentially creating admin users and backdoors on affected sites.
  • Over 131,000 attack attempts have been blocked, including more than 15,000 in the last 24 hours, targeting sites with Sneeit Framework versions up to 8.3.
  • A critical ICTBroadcast flaw (CVE-2025-2611) is also being exploited to distribute a DDoS botnet called “frost,” designed to launch targeted denial-of-service attacks.
  • The “frost” botnet uses fourteen exploits and activates only when specific HTTP response indicators are found, limiting its spread.

A severe security vulnerability in the Sneeit Framework plugin for WordPress is under active attack, according to data reported by Wordfence. The remote code execution flaw identified as CVE-2025-6389, with a CVSS severity score of 9.8, affects all versions through 8.3 and was patched in version 8.4 released on August 5, 2025. The plugin currently has over 1,700 active installs.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

The vulnerability stems from the [sneeit_articles_pagination_callback()] function, which improperly processes user input through the PHP function call_user_func(), allowing unauthorized attackers to execute code remotely. This can be leveraged to create malicious administrator accounts or install backdoors, enabling full site takeover. Wordfence noted, “This makes it possible for unauthenticated attackers to execute code on the server, which can be leveraged to inject backdoors or, for example, create new administrative user accounts.”

Since public disclosure on November 24, 2025, more than 131,000 attacks have been blocked, including over 15,000 in just the last 24 hours. Attackers have sent crafted HTTP requests to the “/wp-admin/admin-ajax.php” endpoint to create admin users such as “arudikadis” and upload malicious PHP files like “tijtewmg.php” for backdoor access. The assaults originated from multiple IP addresses including 185.125.50.59, 182.8.226.51, and 89.187.175.80 among others.

Additionally, malicious PHP files found on compromised hosts have varied capabilities such as scanning, file manipulation, and extracting ZIP archives. Files named “xL.php,” “Canonical.php,” “.a.php,” and “simple.php” were observed. The “xL.php” script is downloaded by a helper file exploiting the vulnerability and also retrieves an “.htaccess” file from “racoonlab[.]top” to permit script access on Apache servers, according to Wordfence researcher István Márton.

In a related event, VulnCheck reported exploitation of a critical ICTBroadcast flaw (CVE-2025-2611, CVSS: 9.3) to deliver a distributed denial-of-service (DDoS) botnet named “frost.” The botnet downloads and executes architecture-specific binaries, then deletes traces to evade detection. VulnCheck’s Jacob Baines explained, “The ‘frost’ binary combines DDoS tooling with spreader logic that includes fourteen exploits for fifteen CVEs.” It selectively initiates attacks based on HTTP response indicators like “Set-Cookie: user=(null)” and “Set-Cookie: user=admin” to avoid unnecessary activity.

- Advertisement -

These targeted attacks, launched from IP address 87.121.84.52, focus on fewer than 10,000 internet-facing vulnerable systems, suggesting a relatively small botnet scale. Evidence indicates the attacker possesses additional undisclosed capabilities beyond those visible in the observed exploits.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

$35M in Bitcoin seized after police crack lost wallet

Irish police, with Europol's help, have seized 500 Bitcoin (worth over $35 million) from...

Gold Crashes to 4-Month Low; Strategists Keep $5K–$6.3K Targets

Gold crashed to a four-month low of $4,098, posting its worst five-session performance since...

Baltimore sues xAI over Grok’s millions of non-consensual deepfakes

The Mayor and City Council of Baltimore have sued X Corp., xAI, and SpaceX,...

SpaceX Targets Historic $75B IPO Filing This Week

SpaceX may file for its record-breaking IPO as soon as this week, targeting a...

Ethereum Aims for Quantum Resistance by 2029

The Ethereum Foundation has launched a "Post-Quantum Ethereum" resource hub to address future quantum...

Must Read

14 Ways On How to Make Money with Cryptocurrency

Many people want to make money with cryptocurrency because they have heard the success stories of people who became millionaires from zero.If you...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading