CVE-2025-6389
BaseFortify
Publication date: 2025-11-25
Last updated on: 2025-11-25
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | sneeit_framework | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the Sneeit Framework plugin for WordPress allows unauthenticated attackers to execute remote code on the server via the sneeit_articles_pagination_callback() function. This function improperly handles user input by passing it through call_user_func(), enabling attackers to run arbitrary code.
How can this vulnerability impact me? :
This vulnerability can allow attackers to execute arbitrary code on your server without authentication. They could inject backdoors or create new administrative user accounts, potentially leading to full control over your WordPress site and server.