Why this is serious
This is not a theoretical risk. The exploit is straightforward: any authenticated user (even a free subscriber on WordPress, or a registered user on Joomla) can call Smart Slider 3's export function and receive a ZIP file containing any file on the server. There's no special tooling required.
With your wp-config.php or configuration.php in hand, an attacker can forge admin session cookies, connect directly to your database, and maintain persistent access even after you patch the plugin. Sites running WooCommerce, membership plugins, or open registration are at the highest risk. The WordPress and Joomla versions share the same Nextend framework codebase, so both platforms carry identical risk.
Smart Slider 3 has had eight documented vulnerabilities since 2021, three of which required only subscriber access. This is a pattern worth factoring into your risk assessment.
|