A security failure in Smart Slider 3, one of the most popular WordPress plugins to create leaders and carousel, has put hundreds of thousands of sites at risk. Vulnerability allows users with minimum credentials, for example subscribers, to read arbitrary files on the server when the plugin has not been updated, which can lead to data theft or full site taking if you access critical files.
The problem, traced as CVE-2026-3098, was discovered by researcher Dmitrii Ignatyev and confirmed by the security team of Defiant (the developers of the Wordfence plugin). According to the analysis published by Wordfence, the function responsible for exporting content within the plugin does not correctly value the origin or type of file that it incorporates into the export file. This absence of checks allows an authenticated user to request the inclusion of sensitive files, even with .php extensions, in the export.

In practice this means that an attacker with a subscriber account - a role that many sites allow for subscriptions, membranes or forums - can request the reading of files such as wp-config.php where database credentials, keys and jumps are stored that protect cryptographic aspects of the site. With these data in hand, a limited initial access can quickly climb into a total commitment.
The existence of a nonce in the AJAX requests does not mitigate the problem, because that token can be obtained by any authenticated user. In other words, the barrier that usually avoids abuses in AJAX requests is not enough when the plugin logic does not restrict which users can execute the action or which files can be included in the export.
Vulnerability affected all versions of the plugin up to 3.5.1.33. Nextendweb, the company behind Smart Slider 3, recognized the report and published a correction in the version 3.5.1.34 March 24. The technical details and traceability of the report and validation can be found in the Wordfence analysis: Wordfence analysis.
In terms of scope, Smart Slider 3 has a very wide facility base. Public statistics from the WordPress repository indicate high recent downloads, suggesting that at least half a million sites continue to run vulnerable versions at the time of the announcement. You can see the download data and the plugin tab on WordPress.org: plugin page on WordPress.org.
If you manage a WordPress site with this plugin, the immediate recommendation is to update to the parched version. Updating is the most direct measure to close the door to this attack vector. If for any reason you cannot apply the patch immediately, you should temporarily disable the plugin or restrict access to less privileged accounts until the solution has been applied.
Beyond updating, there are additional prudent actions: review activity and access records for suspicious export-related requests; check for new users or unexpected changes on the site; and, if there are signs of exploitation, rotate database credentials and WordPress keys / jumps. The official WordPress hardening guide offers good practices to protect installation and reduce the impact of these types of failures: Hardening WordPress.
It is important to understand that, although vulnerability requires the attacker to be authenticated, many sites have open registration options or have low-level user accounts that are easily created. That makes what appears to be a restriction on a real risk for platforms with memberships, blogs with registered comments or stores with customer accounts. Defiant also stressed that the vulnerable function did not filter by file type or source, which was why the reading of sensitive files was possible.

In the WordPress ecosystem patches usually come out fast, but the real exposure window depends on managers applying the updates. If you need more technical context or concept tests validated by the response team, the Wordfence report details how the failure was reached and what changes the correction introduces. For more technical information and patch monitoring, see the official release: entry into the Wordfence blog, and the plugin tab on WordPress.org to verify the installed version: Smart Slider 3 on WordPress.org.
If you manage several sites or work in an agency, treat this alert as a priority: automate version checks, apply updates in a controlled window and plan the rotation of secrets when there is suspicion of manipulation. Recent history reminds us that vulnerabilities in popular plugins tend to have massive impact for the simple reason of the scale of facilities.
The good news is that there is a patch and the vectors are well understood by the researchers. The key is to close the circle: immediate update, review of commitment signals and maintenance habits that reduce the probability of exposure to the next vulnerability. Keeping plugins up to date and limiting the number of accounts with access, although it seems basic, remains one of the most effective defenses.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...

PinTheft the public explosion that could give you root on Arch Linux
A new public explosion has brought to the surface again the fragility of the Linux privilege model: the V12 Security team named the failure as PinTheft and published a concept t...