Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in mdedev Run Contests, Raffles, and Giveaways with ContestsWP contest-code-checker allows Retrieve Embedded Sensitive Data.This issue affects Run Contests, Raffles, and Giveaways with ContestsWP: from n/a through <= 2.0.7.
Published: 2026-02-03
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in the mdedev Run Contests, Raffles, and Giveaways with ContestsWP plugin allows an actor with access to the WordPress administration area to retrieve sensitive system information that the plugin inadvertently exposes. The failure to restrict the modes or permissions of the embedded data results in a failure to prevent unauthorized disclosure, which can lead to exposure of credentials, configuration details, or other proprietary information that an attacker could later leverage to compromise the host platform or further infiltrate the network. The weakness is classified as CWE-497.

Affected Systems

Users of the WordPress plugin "Run Contests, Raffles, and Giveaways with ContestsWP" from the vendor mdedev, versions up to and including 2.0.7, are affected. The plugin was known to be installed in a variety of WordPress sites and provides contest‑management functionality that may store user input and system data.

Risk and Exploitability

The CVSS base score is 5.3, indicating a moderate severity. Likely exploitation would involve an attacker who has gained at least basic administrative access to the WordPress site or can trick an admin into revealing the compromised data, as the plugin’s exposed endpoints do not enforce strict authentication. The EPSS score is below 1%, suggesting that exploitation is rare, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalogue. Nonetheless, the sensitive data exposed could be valuable for attackers, especially if it contains credentials or configuration secrets. Because the vulnerability is tied to a specific plugin rather than the core WordPress engine, remote attackers without site access are not directly able to exploit it, but attackers who succeed in phishing or other social‑engineering attacks against site administrators could benefit greatly.

Generated by OpenCVE AI on April 16, 2026 at 01:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the plugin to version 2.0.8 or later, as the vendor has patched the data‑exposure issue.
  • If an upgrade is not feasible immediately, remove the plugin entirely and replace its functionality with a validated alternative that does not expose sensitive data.
  • After removal or upgrade, conduct a review of the WordPress installation for any residual sensitive information that may have been stored by the previous plugin, such as in the database or in deleted files, and enforce strict file permissions to limit read access to the WordPress files.

Generated by OpenCVE AI on April 16, 2026 at 01:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 03 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 14:30:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in mdedev Run Contests, Raffles, and Giveaways with ContestsWP contest-code-checker allows Retrieve Embedded Sensitive Data.This issue affects Run Contests, Raffles, and Giveaways with ContestsWP: from n/a through <= 2.0.7.
Title WordPress Run Contests, Raffles, and Giveaways with ContestsWP plugin <= 2.0.7 - Sensitive Data Exposure vulnerability
Weaknesses CWE-497
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:14:42.672Z

Reserved: 2026-01-28T09:51:55.183Z

Link: CVE-2026-25023

cve-icon Vulnrichment

Updated: 2026-02-03T16:11:55.916Z

cve-icon NVD

Status : Deferred

Published: 2026-02-03T15:16:20.710

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-25023

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T01:15:20Z

Weaknesses