Vulnerability in Smart Slider Plugin Affects 500,000 WordPress Websites

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Security Flaw in Smart Slider 3 Plugin Poses Risk to Over 800,000 Websites

A significant vulnerability has been identified within the Smart Slider 3 plugin for WordPress, utilized by more than 800,000 sites. This flaw allows authenticated users with subscriber-level permissions to gain access to arbitrary files stored on the server.

An adversarial intruder could exploit this vulnerability to uncover sensitive files, including the crucial wp-config.php file. This file contains essential information, such as database credentials and security keys, heightening the risk of data breaches and potential full website compromise.

Smart Slider 3 ranks among the most popular WordPress plugins, facilitating the creation and management of image sliders and content carousels through an intuitive drag-and-drop interface and an extensive array of customizable templates.

The security vulnerability, designated as CVE-2026-3098, was uncovered and reported by researcher Dmitrii Ignatyev. It affects all iterations of the Smart Slider 3 plugin up to version 3.5.1.33.

With a medium severity rating, the vulnerability requires user authentication for exploitation. However, its implications extend to numerous websites that incorporate membership or subscription functionalities, a prevalent feature in contemporary web platforms.

The root of the issue lies in the inadequate capability checks in the plugin’s AJAX export processes, allowing any authenticated user, including subscribers, to execute these actions.

According to experts from WordPress security firm Defiant, the developer behind the Wordfence security plugin, the actionExportAll function notably lacks validation for file types and sources.

Consequently, this oversight permits unauthorized reading of server files, which could be included in the export archive.

The inclusion of a nonce fails to mitigate this risk, as authenticated users can readily acquire this token. Regrettably, this function does not incorporate necessary file type or source checks in the vulnerable version.

Hence, it permits not only the export of images or videos, but also .php files, states István Márton, a vulnerability research contractor at Defiant.

“This ultimately enables authenticated attackers—who possess minimal access, such as subscribers—to read any arbitrary file on the server, including critical files such as wp-config.php, which holds essential database credentials as well as cryptographic keys and salts.”

A staggering number of Websites Remain At Risk

On February 23, Ignatyev disclosed his findings to Wordfence, whose team subsequently verified the proof-of-concept exploit and notified Nextendweb, the developer behind Smart Slider 3.

Nextendweb acknowledged the report on March 2 and responded with a patch through the release of Smart Slider version 3.5.1.34 on March 24.

a close up of a typewriter with the word wordpress printed on it

According to WordPress.org statistics, the plugin saw 303,428 downloads in the preceding week. This translates to at least 500,000 WordPress sites operating on vulnerable versions of the Smart Slider 3 plugin, leaving them susceptible to potential attacks.

As of now, CVE-2026-3098 is not classified as actively exploited; however, this status may evolve swiftly. Therefore, immediate action is advocated for website owners and administrators.

Source link: Bleepingcomputer.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

Souvik Banerjee

I’m Souvik Banerjee from Kolkata, India. As a Marketing Manager at RS Web Solutions (RSWEBSOLS), I specialize in digital marketing, SEO, programming, web development, and eCommerce strategies. I also write tutorials and tech articles that help professionals better understand web technologies.
Share the Love
Related News Worth Reading