Description
Deserialization of Untrusted Data vulnerability in TotalSuite TotalContest Lite totalcontest-lite allows Object Injection.This issue affects TotalContest Lite: from n/a through <= 2.9.1.
Published: 2026-03-20
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Object Injection potentially enabling Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

TotalSuite’s TotalContest Lite plugin processes serialized data without validating its source, creating a deserialization weakness that permits attackers to inject arbitrary PHP objects. The vulnerability can be exploited to craft a malicious payload that, when the plugin deserializes it, may execute code on the web server or manipulate application data, compromising confidentiality, integrity, and availability of the affected WordPress site.

Affected Systems

WordPress sites that use the TotalContest Lite plugin version 2.9.1 or earlier are at risk. The plugin is distributed by TotalSuite and is commonly named TotalContest Lite in plugin directories.

Risk and Exploitability

The EPSS score indicates a very low probability (<1%) that this flaw will be actively exploited in the wild, and it is not cataloged in CISA’s KEV registry. The absence of a publicly disclosed exploit and the requirement for the attacker to supply crafted serialized data suggest that the attack vector is remote and requires some form of user or administrative interaction. Although the immediate risk level is low, the potential impact of Remote Code Execution warrants prompt attention.

Generated by OpenCVE AI on April 2, 2026 at 03:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the TotalContest Lite plugin to version 2.9.2 or later, which removes the vulnerable deserialization logic.
  • If an immediate upgrade is not feasible, disable the TotalContest Lite plugin or restrict its access to trusted administrators only.
  • Validate and sanitize all data inputs that the plugin processes, ensuring that only legitimate serialized data is accepted.
  • Monitor server logs for anomalous PHP object deserialization attempts and review any unauthorized file uploads.

Generated by OpenCVE AI on April 2, 2026 at 03:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in TotalSuite TotalContest Lite allows Object Injection.This issue affects TotalContest Lite: from n/a through 2.9.1. Deserialization of Untrusted Data vulnerability in TotalSuite TotalContest Lite totalcontest-lite allows Object Injection.This issue affects TotalContest Lite: from n/a through <= 2.9.1.
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Fri, 20 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Totalsuite
Totalsuite totalcontest
Wordpress
Wordpress wordpress
Vendors & Products Totalsuite
Totalsuite totalcontest
Wordpress
Wordpress wordpress

Fri, 20 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in TotalSuite TotalContest Lite allows Object Injection.This issue affects TotalContest Lite: from n/a through 2.9.1.
Title WordPress TotalContest Lite plugin <= 2.9.1 - PHP Object Injection vulnerability
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Totalsuite Totalcontest
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T16:00:38.816Z

Reserved: 2026-01-07T17:39:35.855Z

Link: CVE-2026-0677

cve-icon Vulnrichment

Updated: 2026-03-20T11:53:48.720Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T10:16:18.257

Modified: 2026-04-01T17:28:25.787

Link: CVE-2026-0677

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:59:34Z

Weaknesses