HomeVulnerabilityFile learn flaw in Sensible Slider plugin impacts 500K WordPress websites

File learn flaw in Sensible Slider plugin impacts 500K WordPress websites

A vulnerability within the Sensible Slider 3 WordPress plugin, energetic on greater than 800,000 web sites, could be exploited to permit subscriber-level customers entry to arbitrary recordsdata on the server.

An authenticated attacker may use it to entry delicate recordsdata, akin to wp-config.php, which consists of database credentials, keys, and salt knowledge, creating the chance for person knowledge theft and full web site takeover.

Sensible Slider 3 is likely one of the hottest WordPress plugins for creating and managing picture sliders and content material carousels. It presents an easy-to-use drag-and-drop editor and a wealthy set of templates to select from.

The security concern, tracked as CVE-2026-3098, was found and reported by researcher Dmitrii Ignatyev and impacts all variations of the Sensible Slider 3 plugin by way of 3.5.1.33.

It acquired a medium severity rating resulting from requiring authentication. Nevertheless, this solely limits the impression to web sites with membership or subscription choices, a function that’s widespread on many platforms today.

The vulnerability stems from lacking functionality checks within the plugin’s AJAX export actions. This enables any authenticated person, together with subscribers, to invoke them.

See also  Latest Ivanti SSRF zero-day now beneath mass exploitation

In accordance with researchers at WordPress security firm Defiant, the developer of the Wordfence security plugin, the ‘actionExportAll’ operate lacks file kind and supply validation, thus permitting arbitrary server recordsdata to be learn and added to the export archive.

The presence of a nonce doesn’t stop abuse as a result of it may be obtained by authenticated customers.

“Sadly, this operate doesn’t embrace any file kind or file supply checks within the weak model. Because of this not solely picture or video recordsdata could be exported, however .php recordsdata can as properly,” says István Márton, a vulnerability analysis contractor at Defiant.

“This finally makes it doable for authenticated attackers with minimal entry, like subscribers, to learn any arbitrary file on the server, together with the positioning’s wp-config.php file, which incorporates the database credentials in addition to keys and salts for cryptographic security.”

500K web sites nonetheless weak

On February 23, Ignatyev reported his findings to Wordfence, whose researchers validated the supplied proof-of-concept exploit and knowledgeable Nextendweb, the developer of Sensible Slider 3.

See also  Ivanti fixes three crucial flaws in Join Safe & Coverage Safe

Nextendweb acknowledged the report on March 2 and on March 24 delivered a patch with the discharge of Sensible Slider model 3.5.1.34.

In accordance with WordPress.org stats, the plugin was downloaded 303,428 occasions over the previous week. Because of this a minimum of 500,000 WordPress websites are working a weak model of the Sensible Slider 3 plugin and are uncovered to assaults.

CVE-2026-3098 just isn’t flagged as actively exploited as of writing, however the standing could change quickly, so immediate motion is required by web site house owners/administrations.

tines

Automated pentesting proves the trail exists. BAS proves whether or not your controls cease it. Most groups run one with out the opposite.

This whitepaper maps six validation surfaces, reveals the place protection ends, and gives practitioners with three diagnostic questions for any device analysis.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular