CVE-2026-34424
Remote Code Execution via Compromised Update in Smart Slider 3 Pro
Publication date: 2026-04-09
Last updated on: 2026-04-09
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| smart_slider | smart_slider_3_pro | 3.5.1.35 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-506 | The product contains code that appears to be malicious in nature. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthenticated attackers to execute arbitrary code, create hidden administrator accounts, exfiltrate credentials and access keys, and maintain persistence through multiple injection points. Such actions can lead to unauthorized access to sensitive data and systems.
As a result, organizations using the affected software may face significant risks related to data breaches and unauthorized data exposure, which can impact compliance with standards and regulations like GDPR and HIPAA that require protection of personal and sensitive information.
Specifically, the exfiltration of credentials and access keys and the creation of hidden accounts undermine data confidentiality and integrity requirements mandated by these regulations.
Can you explain this vulnerability to me?
Smart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-stage remote access toolkit that was injected through a compromised update system.
This vulnerability allows unauthenticated attackers to execute arbitrary code and commands remotely by exploiting HTTP headers before any authentication.
Attackers can establish authenticated backdoors that accept arbitrary PHP code or operating system commands, create hidden administrator accounts, exfiltrate credentials and access keys, and maintain persistence through multiple injection points including must-use plugins and core file modifications.
How can this vulnerability impact me? :
This vulnerability can have severe impacts including unauthorized remote code execution and full system compromise.
- Attackers can gain remote shell access without authentication.
- They can create hidden administrator accounts to maintain long-term access.
- Sensitive information such as credentials and access keys can be exfiltrated.
- Persistence can be maintained through multiple injection points, making removal difficult.