Description
Deserialization of Untrusted Data vulnerability in Kleor Contact Manager contact-manager allows Object Injection.This issue affects Contact Manager: from n/a through <= 9.1.1.
Published: 2026-02-20
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from the Kleor Contact Manager plugin deserializing untrusted data, enabling an attacker to inject malicious PHP objects. This object injection can allow arbitrary code execution or other unauthorized operations on a WordPress site where the plugin is active. The weakness is classified as CWE‑502.

Affected Systems

WordPress sites using the Kleor Contact Manager plugin from any version through 9.1.1 are affected. The vulnerability applies to all installations running these plugin versions.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity, while the EPSS of <1% suggests a low current exploitation probability. The vulnerability is not listed in CISA KEV. The likely attack vector is submission of crafted serialized payloads to the plugin via exposed API or form endpoints, which is inferred from the fact that the plugin deserializes untrusted data. Though no public exploitation evidence exists, the potential impact of remote code execution is significant if an attacker succeeds.

Generated by OpenCVE AI on April 29, 2026 at 14:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest security patch by upgrading the Kleor Contact Manager plugin to a version newer than 9.1.1.
  • If an upgrade is not immediately possible, deactivate or remove the plugin from the WordPress installation to eliminate the vulnerable code.
  • Verify that any user‑supplied data is not deserialized without validation, and consider sanitizing or rejecting untrusted serialized payloads before processing.

Generated by OpenCVE AI on April 29, 2026 at 14:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 22:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Kleor
Kleor contact Manager
Wordpress
Wordpress wordpress
Vendors & Products Kleor
Kleor contact Manager
Wordpress
Wordpress wordpress

Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in Kleor Contact Manager contact-manager allows Object Injection.This issue affects Contact Manager: from n/a through <= 9.1.1.
Title WordPress Contact Manager plugin <= 9.1.1 - PHP Object Injection vulnerability
Weaknesses CWE-502
References

Subscriptions

Kleor Contact Manager
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:31.716Z

Reserved: 2025-12-24T14:00:10.434Z

Link: CVE-2025-68853

cve-icon Vulnrichment

Updated: 2026-02-24T21:07:17.744Z

cve-icon NVD

Status : Deferred

Published: 2026-02-20T16:22:14.150

Modified: 2026-04-27T19:16:36.843

Link: CVE-2025-68853

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T14:45:13Z

Weaknesses