A vulnerability in the Smart Slider 3 WordPress plugin, active on more than 800,000 websites, can be exploited to allow subscriber-level users access to arbitrary files on the server. [...]
I need the complete original summary to write an accurate article. You've provided the title and opening, but the content cuts off at "[...]".
Please share the full summary including:
Technical details: CVE ID, vulnerability type (LFI/path traversal/etc.), affected versionsAttack prerequisites: What access level is needed? What conditions trigger it?Impact scope: How many sites are actively vulnerable?Remediation: Has a patch been released? What's the fix?Timeline: When was it discovered/reported/patched?CVSS score or severity ratingAny proof-of-concept or real-world exploitation detailsOnce you provide the complete summary, I'll expand it into a comprehensive 800-1200 word article with proper journalistic structure, technical analysis, and actionable recommendations for HackWire readers.