mySites.guru

Smart Slider 3 Hack Allows Any File to Be Downloaded

Smart Slider 3 Hack Allows Any File to Be Downloaded

Smart Slider 3, one of the most popular slider plugins for WordPress with over 800,000 active installations, has a vulnerability that lets any registered user download any file from your server. Not just images or slider assets. Any file the web server process can read.

wp-config.php with your database credentials. /etc/passwd. Your .env file. Private SSL keys. Database backup files sitting in a directory someone forgot to protect. Payment gateway configs. SMTP credentials. If it’s on the filesystem and readable by the web server, an attacker with nothing more than a free subscriber account can download it.

The vulnerability (CVE-2026-3098, CVSS 6.5 Medium) affects all versions up to and including 3.5.1.33. If you run Smart Slider 3, update to version 3.5.1.34 now.

This was first reported by Wordfence, but their disclosure doesn’t mention Joomla once. Smart Slider 3 also ships as a Joomla extension, and we’ve confirmed it shares the same vulnerable codebase - identical files, identical hashes. If you manage Joomla sites, read the Joomla section below.

TL;DR"Too Long; Didn't Read" - a quick summary of the key points.

  • CVE-2026-3098 - CVSS 6.5 arbitrary file read in Smart Slider 3 versions up to 3.5.1.33
  • Any subscriber-level user can download any file the web server can read: wp-config.php, .env, /etc/passwd, private keys, database backups, payment configs
  • Update to Smart Slider 3.5.1.34 immediately
  • After updating, regenerate your authentication keys/salts and change your database password
  • Sites with open user registration are at highest risk

Update now. Don't wait.

This vulnerability is public knowledge. The exploit requires only a free subscriber account. If your site allows any form of user registration, every minute you wait is a minute an attacker could be downloading your database credentials, private keys, and every other sensitive file on your server.

How Many mySites.guru Users Are Affected by Smart Slider 3?

We checked our database this morning. Across the thousands of agencies using mySites.guru:

724

Agencies affected

7,869

Sites running vulnerable versions

Every one of those agencies already has a warning in their mySites.guru dashboard, because the Wordfence Vulnerability API is built into the platform and flagged it automatically. All 724 are being emailed today.

Those 724 agencies didn’t need to read this post to know they had a problem. They already knew.

How Does the mySites.guru Detection of Smart Slider 3 Work?

Twice a day, a snapshot runs on each connected WordPress site, collecting every installed plugin and its version number. That list gets cross-referenced against Wordfence, CVE/Mitre, and custom threat intelligence databases.

If your site runs Smart Slider 3 version 3.5.1.33 or earlier, it gets flagged with the specific CVE, severity rating, and a direct link to the advisory. No manual checking required.

This isn’t the first time mySites.guru has flagged Smart Slider 3 either. The plugin had a previous SQL Injection vulnerability (CVE-2025-6348) in versions up to 3.5.1.28 that was also caught automatically. Here’s what the vulnerability warning looks like in the mySites.guru dashboard:

mySites.guru dashboard showing vulnerability warnings for Smart Slider 3 SQL Injection and other vulnerable plugins, with red Read More buttons and an urgent upgrade banner

Every vulnerable plugin version gets its own entry with the full advisory text, so you know exactly what the risk is before deciding how urgently to patch.

How to Quickly Find Which Sites Have Smart Slider 3 Installed with mySites.guru

When a vulnerability like this drops, the first question is: “Which of my sites have this installed?” If you manage 50 or 200 client sites, you don’t have time to log into each one and check the plugins page.

mySites.guru indexes every plugin on every connected site. One URL gives you the complete list of every site running Smart Slider 3, broken down by version number, with the site’s PHP version, WordPress version, and SSL status alongside it:

mySites.guru extension search showing all sites with Smart Slider 3 installed, grouped by version number from 3.5.1.17 through 3.5.1.34, with each site's PHP version, WordPress version, and SSL status visible

If you’re already a mySites.guru subscriber, you can open this page right now:

View all your Smart Slider 3 installations

Open Smart Slider 3 Extension Search

Lists every version installed across all your connected sites, grouped by version number. You'll see which sites are still on vulnerable versions at a glance.

Every version of Smart Slider 3 installed across your sites is listed at the top. Below that, every individual site running the plugin, with its exact version. You can see which sites are still on vulnerable versions and which have already been updated to 3.5.1.34.

That turns a vulnerability announcement from a stressful afternoon of logging into admin panels into a five-minute triage. One page, you know exactly which clients are exposed, and you start patching.

How to Push the Smart Slider 3 Update Across All Your Sites

Once you know which sites are affected, the mass plugin updater lets you select every site running the vulnerable version and push the update in one batch. When a vulnerability drops affecting 800,000 sites, the agencies that patch in hours rather than weeks are the ones that don’t end up in incident response.

If you don’t have a mySites.guru account yet, sign up for a free trial and connect your sites. The plugin index builds automatically on the first snapshot.

What Happened with Smart Slider 3 CVE-2026-3098?

The vulnerability was discovered by Dmitrii Ignatyev on February 23, 2026, and reported through the Wordfence Bug Bounty Program (earning a $2,208 bounty). Wordfence validated the proof-of-concept the next day and notified the developer, Nextend.

The problem is a missing capability check in Smart Slider 3’s export functionality. The plugin’s AJAX actions that handle slider exports are protected by a nonce (a one-time token that proves the request came from a logged-in session), but there’s no check on whether the user actually has permission to use that feature.

A nonce proves you’re logged in. It doesn’t prove you’re an admin.

In the vulnerable version, any authenticated user, including someone with just a subscriber account, could:

  1. Obtain the required nonce (it’s available to any authenticated user)
  2. Call the actionExportAll function via AJAX
  3. Receive a ZIP file containing exported slider data, including any referenced files

The ExportSlider class’s create() method adds files to the export ZIP using file_get_contents() without validating file types or restricting which directories can be accessed. Image files, video files, PHP files, config files, private keys - everything is treated the same way. There is no allowlist, no path restriction, and no file extension check. An attacker can manipulate the export to include any file the web server process can read.

Important: this is not limited to wp-config.php

Any file readable by the web server is exposed. That includes .env files, /etc/passwd, database backups, SSL private keys, payment gateway configs, SMTP credentials, and any other sensitive file on the server. If you run Smart Slider 3 on a shared hosting account, other sites on the same server may also be at risk depending on your host's isolation setup.

Why Is the Smart Slider 3 File Read So Dangerous?

wp-config.php gets the most attention because it contains everything an attacker needs to own your site, but most servers have sensitive files well beyond WordPress configs.

A single read of wp-config.php gives an attacker:

  • Database username, password, host, and database name. If the database port is accessible from outside the server (more common than you’d think on budget hosting), they can connect directly and pull user password hashes, customer data, WooCommerce orders, and private content.
  • Authentication keys and salts - the eight constants (AUTH_KEY, SECURE_AUTH_KEY, LOGGED_IN_KEY, NONCE_KEY, and their corresponding salts) that WordPress uses to sign session cookies. With these values, an attacker can forge a valid admin session cookie without knowing the admin password.
  • The table prefix, which makes SQL injection attacks against other vulnerabilities more precise.
  • Any third-party secrets stored as constants: API keys, payment gateway credentials, SMTP passwords, cloud storage keys. Many plugins put these in wp-config.php.

The practical attack chain: forge an admin cookie using the stolen keys, log into wp-admin, install a backdoor plugin, and maintain persistent access even after the original vulnerability is patched.

Who Is at Risk from the Smart Slider 3 Vulnerability?

The vulnerability requires subscriber-level authentication, the lowest role in WordPress. This means:

  • WooCommerce stores, where customers create accounts to place orders (subscriber access)
  • Membership sites and anything using a registration plugin
  • Any site with “Anyone can register” enabled in Settings > General
  • Multisite networks, where user registration on any site in the network provides the access level needed
  • Sites with compromised low-privilege accounts from a previous breach or credential stuffing attack

If your site doesn’t allow any form of user registration and has no subscriber accounts, the risk is significantly lower (but not zero, since an attacker could exploit a separate vulnerability to create an account first).

What Should You Do About Smart Slider 3 Right Now?

1. Update Smart Slider 3 to 3.5.1.34

The patch adds capability checks to the export AJAX actions. Update through the WordPress plugin updater or download from wordpress.org.

If you manage multiple sites, use the mySites.guru mass updater to push the update everywhere at once.

2. Regenerate Your Authentication Keys and Salts

If there’s any chance the vulnerability was exploited before you patched, your keys and salts should be considered compromised. Generate new ones at api.wordpress.org/secret-key/1.1/salt/ and replace the existing values in wp-config.php. This immediately invalidates all active sessions, forcing every user (including any attacker with a forged cookie) to log in again.

3. Change Your Database Password

Update the password in your hosting control panel or database server, then update DB_PASSWORD in wp-config.php to match. If the attacker read your credentials, this cuts off direct database access.

4. Audit Your User Accounts

Check your WordPress user list for accounts you don’t recognize, especially subscribers. Delete any unauthorized accounts. If you manage multiple sites, mySites.guru’s user management lets you review accounts across all your sites from one place.

5. Run a Security Audit

Use the mySites.guru suspect content scanner to check for backdoors or modified files. If an attacker escalated from file read to admin access using forged cookies, they may have left persistent backdoors that survive the plugin update.

Set up real-time file change monitoring so you’ll be alerted immediately if any watched files are modified after cleanup.

6. Review Server Access Logs

Check your access logs for unusual requests to Smart Slider 3’s AJAX endpoints. Look for POST requests to admin-ajax.php with actions related to slider export from IP addresses you don’t recognize. This can help determine whether the vulnerability was exploited before the patch.

Smart Slider 3 Has a History of Vulnerabilities

This isn’t a one-off. Smart Slider 3 has had eight documented vulnerabilities since 2021, including two High-severity issues in 2022. If you’re running this plugin, you need to stay on top of updates.

YearCVETypeCVSSMin. RoleFixed In
2021CVE-2021-24382Stored XSS4.8Author3.5.0.9
2022CVE-2022-3357PHP Object Injection8.1Subscriber3.5.1.11
2022CVE-2022-45843Stored XSS5.4Contributor3.5.1.11
2022CVE-2022-45845Deserialization of Untrusted Data8.8Subscriber3.5.1.11
2023CVE-2023-0660Stored XSS6.8Contributor3.5.1.14
2024CVE-2024-3027Missing Auth / File Upload6.4Subscriber3.5.1.23
2025CVE-2025-6348SQL Injection via sliderid7.6Admin3.5.1.29
2026CVE-2026-3098Arbitrary File Read6.5Subscriber3.5.1.34

Notice the pattern: three of these eight vulnerabilities (including the current one) require only subscriber-level access. That’s the lowest authenticated role in WordPress. The 2022 PHP Object Injection (CVSS 8.1) and Deserialization (CVSS 8.8) issues were both subscriber-exploitable too.

The vendor has patched every disclosed vulnerability, and the response time on CVE-2026-3098 (acknowledged March 2, patched March 24) was reasonable. But the recurring pattern, especially around subscriber-level exploits, is something to factor into your risk assessment if you’re deciding whether to keep using this plugin.

Is the Joomla Version of Smart Slider 3 Also Vulnerable?

Yes. Smart Slider 3 is available for both WordPress and Joomla, and they share the same Nextend framework codebase. We compared the patched Joomla release (3.5.1.34) against the patched WordPress release and found identical files - the md5 hashes of both ExportSlider.php and ControllerSliders.php match exactly between platforms.

The vulnerable code path is the same on both platforms: the actionExportAll() method lacked a permission check, and ExportSlider::create() had no file extension whitelist. The 3.5.1.34 patch adds validatePermission('smartslider_edit') and restricts exported files to image and media extensions (jpg, png, gif, mp4, mp3, svg, webp, avif).

The Smart Slider 3 changelog is unified across both platforms, and the 3.5.1.34 entry (“Fix: Vulnerability improvements”) applies to WordPress and Joomla equally. Earlier entries in the same changelog reference Joomla-specific features like Joomla 6 compatibility, VirtueMart generators, and Joomla article generators, confirming this is a single shared codebase.

If you run Smart Slider 3 on Joomla sites, update to 3.5.1.34 with the same urgency. The Wordfence disclosure focuses on WordPress, but the Joomla version carries identical risk.

Other WordPress Slider Plugins Have the Same Problem

Smart Slider 3 isn’t alone. In October 2025, Wordfence disclosed a similar arbitrary file read in Slider Revolution affecting 4 million sites. That vulnerability also allowed authenticated users to read arbitrary server files through the export functionality.

Slider plugins need file system access for exporting and importing configurations. That access, paired with missing authorization checks on export functions, is a recurring vulnerability pattern. The root cause in both cases: nonce validation without capability checks.

Smart Slider 3 CVE-2026-3098 Disclosure Timeline

DateEvent
February 23, 2026Vulnerability submitted to Wordfence Bug Bounty by Dmitrii Ignatyev
February 24, 2026Wordfence validated the proof-of-concept
February 24, 2026Full details sent to Nextend (Smart Slider developer)
February 24, 2026Wordfence Premium/Care/Response users received a firewall rule
March 2, 2026Nextend acknowledged the report and began working on a fix
March 24, 2026Patched version 3.5.1.34 released
March 26, 2026Wordfence Free users received the firewall rule

Want Someone to Handle the Smart Slider 3 Fix for You?

If you’d rather hand this off, visit fix.mysites.guru and submit a request. For a one-time set fee, the site gets patched, audited, locked down, and handed back secure. Non-subscribers get a free month of mySites.guru included.

Further Reading


For a broader look at CMS security, see our agency security guide.

Frequently Asked Questions

What is the Smart Slider 3 vulnerability CVE-2026-3098?
CVE-2026-3098 is a CVSS 6.5 Medium severity arbitrary file read vulnerability in Smart Slider 3 versions 3.5.1.33 and earlier. An attacker with a basic subscriber account can exploit the slider export function to download any file from the server, including wp-config.php which contains database credentials and authentication keys.
How do I know if my site is affected by the Smart Slider 3 vulnerability?
If your site runs Smart Slider 3 version 3.5.1.33 or earlier, it is vulnerable. Check your plugin version in Plugins > Installed Plugins in wp-admin. Update to version 3.5.1.34 or later immediately. mySites.guru's vulnerability alerting will flag this automatically on connected sites.
Does the Smart Slider 3 vulnerability require admin access to exploit?
No. The vulnerability only requires subscriber-level access, the lowest authenticated role in WordPress. Any registered user on your site can exploit it. Sites with open registration, WooCommerce stores, or membership plugins are especially at risk.
What can an attacker do with my wp-config.php file?
wp-config.php contains your database username and password, authentication keys and salts (used to sign session cookies), your table prefix, and often third-party API keys. An attacker can use these to connect to your database directly, forge admin session cookies, or escalate to full site takeover.
Does mySites.guru detect the Smart Slider 3 vulnerability automatically?
Yes. mySites.guru has the Wordfence Vulnerability API built in and cross-references every installed plugin version twice daily. On the day of disclosure, 724 agencies managing 7,869 sites were automatically notified that their sites were running a vulnerable version of Smart Slider 3.
What should I do after updating Smart Slider 3?
After updating to 3.5.1.34 or later, regenerate your WordPress authentication keys and salts in wp-config.php. Change your database password. Review your user list for unauthorized subscriber accounts. Run a security audit to check for signs of prior exploitation.

Ready to Take Control?

Start with a free site audit. No credit card required.

Get Your Free Site Audit