HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

File Read Vulnerability (CVE‑2026‑3098) in Smart Slider 3 Exposes 500K WordPress Sites to Credential Theft

A missing capability check in the Smart Slider 3 WordPress plugin (CVE‑2026‑3098) enables subscriber‑level users to read arbitrary files, including wp‑config.php. Over half a million sites remain vulnerable, putting database credentials and site control at risk for third‑party providers.

🛡️ LiveThreat™ Intelligence · 📅 March 29, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
4 recommended
📰
Source
bleepingcomputer.com

File Read Vulnerability (CVE‑2026‑3098) in Smart Slider 3 Exposes 500K WordPress Sites to Credential Theft

What Happened — A missing capability check in the Smart Slider 3 WordPress plugin (CVE‑2026‑3098) allows any authenticated subscriber‑level user to invoke an export routine that reads arbitrary files, including the critical wp‑config.php. More than 500 000 live sites are still running vulnerable versions.

Why It Matters for TPRM

  • Attackers can harvest database credentials, keys, and salts, enabling full site takeover.
  • Third‑party SaaS platforms that embed WordPress sites inherit this risk from their vendors.
  • The flaw is trivial to exploit once a low‑privilege account exists, expanding the attack surface of otherwise trusted partners.

Who Is Affected — WordPress‑based websites across all sectors, especially hosted, managed‑service, e‑commerce, and SaaS providers that use the Smart Slider 3 plugin.

Recommended Actions

  • Verify whether any of your third‑party web properties run Smart Slider 3 ≤ 3.5.1.33.
  • Apply the 3.5.1.34 patch immediately or replace the plugin.
  • Review user‑role configurations; restrict subscriber access where unnecessary.
  • Rotate database credentials and API keys for any sites that may have been exposed.

Technical Notes — The vulnerability stems from missing capability checks in the plugin’s AJAX actionExportAll export routine, allowing arbitrary file reads without file‑type or source validation. CVE‑2026‑3098 is rated medium severity (CVSS ≈ 5.5) but poses high impact due to credential exposure. No active exploitation is reported, but proof‑of‑concept exists. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.