Sneeit WordPress RCE flaw allows hackers to add themselves as admin – here’s how to stay safe



  • WordFence disclosed critical RCE flaw (CVE-2025-6389) in Sneeit Framework plugin, affecting versions ≤8.3
  • Exploitation allows attackers to create admin accounts, install malicious plugins, and hijack WordPress sites
  • Users urged to update to v8.4, monitor for rogue admins, suspicious PHP files, and malicious AJAX activity

Security researchers from WordFence have warned about a critical-severity vulnerability in a popular plugin which allows threat actors to add themselves as admins on WordPress sites.

In a security advisory published last week, WordFence said it found a remote code execution (RCE) bug in Sneeit Framework, a backend toolkit WordPress admins use to manage theme options, layouts, and custom features. The bug is tracked as CVE-2025-6389, was given a severity score 9.8/10 (critical) and affects all versions of the plugin prior to, and including, 8.3.


https://cdn.mos.cms.futurecdn.net/7NLZKWEKmFLJVAH4nubeaX-970-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img