Report Incident
× Home Cybertech Africa 2023 2 DPO Rw-CSIRT Website About Rw-CSIRT Alerts Advisories About NCSA Documentation News & Events Topics Contact us Opportunities Privacy Policy

Security Alert: Active Exploitation of Critical Vulnerability in Sneeit Framework Plugin for WordPress (CVE‑2025‑6389)

A critical Remote Code Execution (RCE) vulnerability (CVE20256389) in the Sneeit Framework Plugin for WordPress is actively being exploited. This vulnerability allows attackers to execute arbitrary code on affected websites, potentially compromising site integrity and administrative control.
 
Affected Systems:
 
The affected systems and versions are:
  • Sneeit Framework Plugin for WordPress: all versions 8.3 and earlier.
 
Security Risks
 
Exploitation of this vulnerability may lead to complete site compromise, allowing attackers to create unauthorized administrator accounts, deploy backdoors, and execute malicious code that can redirect visitors or further compromise the server.
 
Recommended Actions
 
The National Cyber Security Authority (NCSA) strongly recommends that system administrators:
  • Upgrade to the latest supported version of the installed software as soon as possible to ensure continued access to technical support and security patches.
  • Apply the required and latest security updates as soon as possible.
 
  The released software version for upgrade is:
 
  • Sneeit Framework Plugin for WordPress: Update to version 8.4 or above.
 
  • Before any update task, please ensure you have a recent backup that can easily be restored.
 
For further information and support, please contact NCSA by email at rwcsirt@ncsa.gov.rw or call us at 9009.
 
References

09 December 2025

© 2025 National Cyber Security Authority