Platform
wordpress
Component
smart-slider-3
Fixed in
3.5.2
CVE-2026-3098 describes an Arbitrary File Access vulnerability in the Smart Slider 3 WordPress plugin. This flaw allows authenticated attackers with Subscriber-level access or higher to read arbitrary files on the server, potentially exposing sensitive information. This affects all versions up to and including 3.5.1.33. The vulnerability is fixed in version 3.5.1.34.
CVE-2026-3098 in Smart Slider 3 poses a significant risk to WordPress websites utilizing this plugin. It allows authenticated attackers, even with Subscriber-level access or higher, to read arbitrary files on the server. This means they could potentially access sensitive information such as passwords, API keys, database data, or even the website’s source code. The CVSS score of 6.5 indicates a medium severity vulnerability, but the potential for damage is high due to the ease of exploitation and the sensitivity of the information that could be compromised. Exposure of this information could result in loss of site control, data theft, or reputational damage.
The vulnerability resides within the 'actionExportAll' function of the Smart Slider 3 plugin. An authenticated attacker can manipulate the input to this function to specify the path of an arbitrary file on the server they wish to read. Given that users with Subscriber or higher privileges can authenticate in WordPress, the barrier to entry for exploiting this vulnerability is relatively low. Exploitation typically involves sending a specially crafted HTTP request to the vulnerable website, containing the desired file path. The server, lacking proper validation, will return the file's contents to the attacker. Detecting this exploitation can be difficult, as it can be disguised as legitimate traffic.
Exploit Status
EPSS
0.03% (8% percentile)
CISA SSVC
CVSS Vector
The most effective solution to mitigate CVE-2026-3098 is to update Smart Slider 3 to version 3.5.1.34 or later. This version includes a fix for the arbitrary file read vulnerability. If an immediate update is not possible, it is recommended to restrict access to sensitive files on the server and monitor the website’s logs for any suspicious activity. Additionally, ensure all users have strong passwords and that two-factor authentication is enabled wherever possible. Regular security audits can also help identify and address potential vulnerabilities.
Update to version 3.5.1.34, or a newer patched version
Vulnerability analysis and critical alerts directly to your inbox.
It's an arbitrary file read vulnerability in the Smart Slider 3 plugin for WordPress.
It means the attacker must have logged into the WordPress website with a user account (even a subscriber account).
Restrict access to sensitive files and monitor the website's logs.
If you are using a version of Smart Slider 3 prior to 3.5.1.34, you are vulnerable.
There are WordPress vulnerability scanners that can detect this vulnerability, but updating is the best solution.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.