🚨 Critical WordPress Vulnerability: 900K+ Sites at Risk — What You Must Do NOW

March 31, 2026 — If you’re running a WordPress website, today’s security briefing is non-optional reading. Three critical vulnerabilities have been disclosed in the past 24 hours alone — including one with a CVSS score of 9.8 (near maximum severity) affecting over 900,000 WordPress sites. Here’s everything you need to know.

The Bottom Line Up Front

Plugin Issue Severity Installs Action
WPvivid Backup & Migration Remote Code Execution (RCE) 🔴 CRITICAL (9.8) 900,000+ Update to 0.9.124+
Smart Slider 3 Arbitrary File Read 🟠 HIGH 800,000+ Update to 3.5.1.34+
Gravity SMTP SMTP/API Credential Exposure 🟠 HIGH Unknown Update to 2.1.5+

WordPress core is also on a security release (6.9.2) — update immediately if you haven’t already.

1. WPvivid Backup & Migration — CRITICAL RCE (CVE-2026-1357, CVSS 9.8)

What It Does
The WPvivid Backup & Migration plugin has a flaw that allows attackers to execute any code on your server. Once exploited, an attacker can steal your database, inject malware, install ransomware, or use your server to attack other websites.

How It Works
The plugin uses RSA + AES encryption for backup transfers. When RSA decryption fails, it passes the error value (false) into the AES routine — creating a predictable encryption key. Combined with missing file name sanitisation, attackers can upload a PHP backdoor to your web root.

What You Must Do

Update WPvivid to 0.9.124 immediately

Disable “receive backup from another site” in WPvivid → Settings

Check for unknown PHP files in

12:45:28 PM

/wp-content/, /wp-content/uploads/, and root
4. Rotate database password and WordPress security keys if vulnerable

2. Smart Slider 3 — Critical File Read (CVE-2026-3098)

What It Does
Any logged-in user — even a free subscriber account — can read any file on your server, including wp-config.php (database credentials, WordPress keys, salts).

How It Works
The plugin’s AJAX export function (actionExportAll) lacks permission checks. Any authenticated user can trigger it and request arbitrary files via path traversal (../../wp-config.php). The file gets included in an export archive and downloaded by the attacker.

What You Must Do

Update Smart Slider 3 to 3.5.1.34 immediately

Audit and remove unknown subscriber/admin accounts

Rotate wp-config.php credentials if vulnerable

Enable a WAF (Wordfence, Solid Security, or Sucuri)

⚠️ 500,000+ sites still running vulnerable versions.

3. Gravity SMTP — Data Exposure (CVE-2026-4020, CVSS 7.5)

What It Does
SMTP credentials, API keys, and tokens are exposed to unauthenticated attackers via REST API endpoints. Exposed credentials lead to spam from your domain, blacklisting, and lateral movement.

How It Works
The plugin’s REST API routes return full plugin configuration (SMTP passwords, SendGrid/Mailgun/AWS keys, OAuth tokens) to anyone who sends a request — no authentication required.

What You Must Do

Update Gravity SMTP to 2.1.5 immediately

Rotate all exposed credentials — SMTP passwords, API keys

Check email provider logs for unauthorised activity

Monitor domain reputation via MXToolbox / Google Postmaster Tools

WordPress Core: Update to 6.9.2

WordPress 6.9.2 (released March 10, 2026) is a security release. Update now: Dashboard → Updates → Update Now.

Weekly Landscape: 331 New Vulnerabilities

331 new vulnerabilities this week — 275 plugins and 56 themes. 120 remain unpatched. Top attack types:

Stored XSS — Mal

12:45:39 PM

icious scripts in site content

SQL Injection — Database access via unsanitised queries

Authenticated RCE — Admin code execution via plugins

CSRF — Forged admin actions

🔧 What You Should Do Today — Action Checklist

1. Update WordPress to 6.9.2+

2. Update WPvivid Backup & Migration to 0.9.124+

3. Update Smart Slider 3 to 3.5.1.34+

4. Update Gravity SMTP to 2.1.5+ (if installed)

5. Update ALL other plugins

6. Check and remove unknown user accounts

7. Enable a WAF (not running? install Wordfence today)

8. Verify last clean backup was after January 28, 2026

9. Rotate database password if WPvivid or Smart Slider 3 were vulnerable

10. Subscribe to WPScan, Wordfence blog, WordPress.org security feed

💡 Did You Know?

A CVSS score doesn’t tell the whole story. The Smart Slider 3 vulnerability has a CVSS of 5.3 (Medium). But on any site with subscriber accounts — a news site, membership platform, or e-commerce store — it’s effectively critical because “authentication” is trivially satisfied. Always read the full context of a CVE.

Tags: WordPress Security, WordPress Vulnerabilities, Plugin Security, CVE-2026-1357, CVE-2026-3098, CVE-2026-4020, Web Security, RCE, WAF, WordPress Hardening

Meta Description (160 chars): Three critical WordPress plugin vulnerabilities disclosed today — WPvivid (CVSS 9.8), Smart Slider 3 (CVE-2026-3098), and Gravity SMTP (CVE-2026-4020). Update now.

🔒 Stay protected. Subscribe for daily briefings.