BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Critical WordPress Flaw CVE-2025-6389 Exploited in Wild Attack

Active Exploitation of Critical Sneeit Framework WordPress Plugin Vulnerability and ICTBroadcast DDoS Botnet Deployment

  • A remote code execution vulnerability (CVE-2025-6389) in the Sneeit Framework WordPress plugin is being actively exploited since November 24, 2025.
  • The flaw allows unauthenticated attackers to execute arbitrary PHP functions, potentially creating admin users and backdoors on affected sites.
  • Over 131,000 attack attempts have been blocked, including more than 15,000 in the last 24 hours, targeting sites with Sneeit Framework versions up to 8.3.
  • A critical ICTBroadcast flaw (CVE-2025-2611) is also being exploited to distribute a DDoS botnet called “frost,” designed to launch targeted denial-of-service attacks.
  • The “frost” botnet uses fourteen exploits and activates only when specific HTTP response indicators are found, limiting its spread.

A severe security vulnerability in the Sneeit Framework plugin for WordPress is under active attack, according to data reported by Wordfence. The remote code execution flaw identified as CVE-2025-6389, with a CVSS severity score of 9.8, affects all versions through 8.3 and was patched in version 8.4 released on August 5, 2025. The plugin currently has over 1,700 active installs.

- Advertisement -

The vulnerability stems from the [sneeit_articles_pagination_callback()] function, which improperly processes user input through the PHP function call_user_func(), allowing unauthorized attackers to execute code remotely. This can be leveraged to create malicious administrator accounts or install backdoors, enabling full site takeover. Wordfence noted, “This makes it possible for unauthenticated attackers to execute code on the server, which can be leveraged to inject backdoors or, for example, create new administrative user accounts.”

Since public disclosure on November 24, 2025, more than 131,000 attacks have been blocked, including over 15,000 in just the last 24 hours. Attackers have sent crafted HTTP requests to the “/wp-admin/admin-ajax.php” endpoint to create admin users such as “arudikadis” and upload malicious PHP files like “tijtewmg.php” for backdoor access. The assaults originated from multiple IP addresses including 185.125.50.59, 182.8.226.51, and 89.187.175.80 among others.

Additionally, malicious PHP files found on compromised hosts have varied capabilities such as scanning, file manipulation, and extracting ZIP archives. Files named “xL.php,” “Canonical.php,” “.a.php,” and “simple.php” were observed. The “xL.php” script is downloaded by a helper file exploiting the vulnerability and also retrieves an “.htaccess” file from “racoonlab[.]top” to permit script access on Apache servers, according to Wordfence researcher István Márton.

In a related event, VulnCheck reported exploitation of a critical ICTBroadcast flaw (CVE-2025-2611, CVSS: 9.3) to deliver a distributed denial-of-service (DDoS) botnet named “frost.” The botnet downloads and executes architecture-specific binaries, then deletes traces to evade detection. VulnCheck’s Jacob Baines explained, “The ‘frost’ binary combines DDoS tooling with spreader logic that includes fourteen exploits for fifteen CVEs.” It selectively initiates attacks based on HTTP response indicators like “Set-Cookie: user=(null)” and “Set-Cookie: user=admin” to avoid unnecessary activity.

- Advertisement -

These targeted attacks, launched from IP address 87.121.84.52, focus on fewer than 10,000 internet-facing vulnerable systems, suggesting a relatively small botnet scale. Evidence indicates the attacker possesses additional undisclosed capabilities beyond those visible in the observed exploits.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

New botnet targets Android TVs, IoT devices

A new Mirai-derived botnet called xlabs_v1 is targeting internet-exposed Android devices to build a...

Corning Stock Up 9% on $500M Nvidia Deal

Corning stock surged 9% to a record high after announcing a $500 million deal...

Bittrex Seeks $24M SEC Settlement Refund After Policy Shift

Defunct crypto exchange Bittrex is asking a federal judge to overturn its 2023 settlement...

Witkoff Backs Tether CEO’s ‘Trillions of Agents’ Crypto Future

World Liberty Financial is expanding rapidly into stablecoins and tokenized assets, positioning USD-backed stablecoins...

Strategy’s Saylor reverses stance, may sell Bitcoin for dividends

Michael Saylor's company, Strategy (formerly MicroStrategy), announced on its Q1 2026 earnings call that...

Must Read

This is How to Buy and Sell Bitcoin

Now more than ever, there are a variety of ways to enter and exit the crypto market. While this is good, the availability of...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading