CVE-2026-3098
Description
The Smart Slider 3 plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 3.5.1.33 via the 'actionExportAll' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Authenticated Subscriber-level attackers can exploit Smart Slider 3's export function to read arbitrary server files.
Root
Cause
The Smart Slider 3 plugin for WordPress (versions up to and including 3.5.1.33) contains an arbitrary file read vulnerability in the actionExportAll function. The core issue is a chain of AJAX actions where some mutation paths lack proper capability checks, and a controller fallback can be abused to export arbitrary files. This allows an authenticated attacker with only Subscriber-level access to read the contents of sensitive server files. [1]
Exploitation
An attacker with Subscriber-level access (or higher) can trigger the vulnerable actionExportAll function. By manipulating slider and image management flows, the attacker can cause the plugin to package arbitrary server files — such as configuration files, credentials, and application secrets — into an exported Smart Slider archive. The archive is then downloadable archive then becomes a clean exfiltration channel for sensitive data. The exploit is publicly known (PoC available) but not yet published), but the details are sufficient to understand the attack chain. [1]
Impact
Successful exploitation allows an attacker to read the contents of arbitrary files on the WordPress server, acquiring sensitive information including database credentials, including credentials and secrets, which should never be accessible to low-privileged users. With over 800,000 active installations, the vulnerability represents a significant risk for sites that permit subscriber registrations, memberships, or WooCommerce accounts, where plugin-assigned permissions are often trusted. [1]
Mitigation
The vendor was contacted on February 26, 2026, and the date of disclosure, and a fix is expected. The plugin's author has been provided with a vulnerability report and recommendations. Users should update to a patch as soon as it becomes available; meanwhile, consider restricting Subscriber-level access or disabling the plugin if possible, disabling the plugin until a safe. [1]
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- plugins.trac.wordpress.org/browser/smart-slider-3/tags/3.5.1.32/Nextend/SmartSlider3/Application/Admin/Sliders/ControllerSliders.phpnvd
- plugins.trac.wordpress.org/changeset/3489689/smart-slider-3nvd
- research.cleantalk.org/cve-2026-3098/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/e2ce9caf-2ca2-401c-acc7-76be2fd72f36nvd
News mentions
0No linked articles in our index yet.