Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nextendweb
Nextendweb smart Slider 3 Wordpress Wordpress wordpress |
|
| Vendors & Products |
Nextendweb
Nextendweb smart Slider 3 Wordpress Wordpress wordpress |
Sat, 28 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Smart Slider 3 plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 3.5.1.33 via the 'actionExportAll' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. | |
| Title | Smart Slider 3 <= 3.5.1.33 - Authenticated (Subscriber+) Arbitrary File Read via actionExportAll | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:29:18.084Z
Reserved: 2026-02-24T07:04:35.393Z
Link: CVE-2026-3098
Updated: 2026-03-27T19:30:44.688Z
Status : Deferred
Published: 2026-03-27T04:16:03.570
Modified: 2026-04-24T16:35:20.070
Link: CVE-2026-3098
No data.
OpenCVE Enrichment
Updated: 2026-03-30T07:02:24Z