File read flaw in Smart Slider plugin impacts 500K WordPress sites
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,理解其主要内容。 文章讲的是WordPress插件Smart Slider 3的一个漏洞,影响超过80万网站。这个漏洞允许订阅者级别的用户访问服务器上的任意文件。攻击者可以利用这一点获取敏感文件,比如wp-config.php,里面包含数据库凭证和加密密钥,可能导致用户数据被盗和网站被接管。 接下来,漏洞的细节:CVE编号是CVE-2026-3098,由Dmitrii Ignatyev发现,影响所有版本到3.5.1.33。严重性评分中等,因为需要认证。但很多网站都有订阅功能,所以影响不小。 漏洞原因在于AJAX导出操作缺少权限检查,特别是actionExportAll函数没有文件类型和来源验证。攻击者可以导出任何文件,包括PHP文件。尽管有Nonce保护,但认证用户可以获取它。 修复情况:开发者在3月24日发布了补丁版本3.5.1.34。但根据统计,仍有约50万网站使用旧版本,面临风险。 总结时要抓住关键点:插件名称、漏洞影响、允许的访问级别、潜在风险、漏洞原因和修复情况。控制在100字以内。 现在组织语言:Smart Slider 3插件存在漏洞(CVE-2026-3098),影响超80万网站。订阅者可利用此漏洞访问服务器任意文件,包括敏感配置文件如wp-config.php,导致数据泄露和网站被接管。该漏洞源于AJAX导出功能缺少验证措施。 </think> Smart Slider 3 WordPress插件存在严重漏洞(CVE-2026-3098),影响超80万网站。该漏洞允许订阅者级别用户访问服务器上的任意文件,包括敏感配置文件如wp-config.php,可能导致数据泄露和网站被接管。 2026-3-29 14:45:20 Author: www.bleepingcomputer.com(查看原文) 阅读量:4 收藏

File read flaw in Smart Slider plugin impacts 500K WordPress sites

A vulnerability in the Smart Slider 3 WordPress plugin, active on more than 800,000 websites, can be exploited to allow subscriber-level users access to arbitrary files on the server.

An authenticated attacker could use it to access sensitive files, such as wp-config.php, which includes database credentials, keys, and salt data, creating the risk for user data theft and complete website takeover.

Smart Slider 3 is one of the most popular WordPress plugins for creating and managing image sliders and content carousels. It offers an easy-to-use drag-and-drop editor and a rich set of templates to choose from.

The security issue, tracked as CVE-2026-3098, was discovered and reported by researcher Dmitrii Ignatyev and impacts all versions of the Smart Slider 3 plugin through 3.5.1.33.

It received a medium severity score due to requiring authentication. However, this only limits the impact to websites with membership or subscription options, a feature that is common on many platforms these days.

The vulnerability stems from missing capability checks in the plugin’s AJAX export actions. This allows any authenticated user, including subscribers, to invoke them.

According to researchers at WordPress security company Defiant, the developer of the Wordfence security plugin, the 'actionExportAll' function lacks file type and source validation, thus allowing arbitrary server files to be read and added to the export archive.

The presence of a nonce does not prevent abuse because it can be obtained by authenticated users.

“Unfortunately, this function does not include any file type or file source checks in the vulnerable version. This means that not only image or video files can be exported, but .php files can as well,” says István Márton, a vulnerability research contractor at Defiant.

“This ultimately makes it possible for authenticated attackers with minimal access, like subscribers, to read any arbitrary file on the server, including the site’s wp-config.php file, which contains the database credentials as well as keys and salts for cryptographic security.”

500K websites still vulnerable

On February 23, Ignatyev reported his findings to Wordfence, whose researchers validated the provided proof-of-concept exploit and informed Nextendweb, the developer of Smart Slider 3.

Nextendweb acknowledged the report on March 2 and on March 24 delivered a patch with the release of Smart Slider version 3.5.1.34.

According to WordPress.org stats, the plugin was downloaded 303,428 times over the past week. This means that at least 500,000 WordPress sites are running a vulnerable version of the Smart Slider 3 plugin and are exposed to attacks.

CVE-2026-3098 is not flagged as actively exploited as of writing, but the status may change soon, so prompt action is required by website owners/administrations.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites/
如有侵权请联系:admin#unsafe.sh