Run Contests, Raffles, and Giveaways with ContestsWP Vulnerability …

Run Contests, Raffles, and Giveaways with ContestsWP Vulnerability …

by | Feb 10, 2026 | Plugins

Attack Vectors

The WordPress plugin Run Contests, Raffles, and Giveaways with ContestsWP (slug: contest-code-checker) is affected by an unauthenticated information exposure vulnerability in versions up to and including 2.0.7 (CVE-2026-25023). Because no login is required, an external attacker can attempt to access exposed data directly over the internet.

In practical business terms, this is the kind of issue that can be probed at scale: attackers can scan sites running vulnerable versions and attempt to extract sensitive user or configuration information without needing credentials or user interaction.

Security Weakness

This is classified as Sensitive Information Exposure and is rated Medium severity (CVSS 5.3, vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). The scoring indicates the weakness is reachable over the network, requires low effort to attempt, and does not require authentication or a user to click anything.

While the integrity and availability impacts are not the primary concern here, the risk is centered on confidentiality: information that should not be public may be accessible to unauthenticated parties in affected versions of ContestsWP.

Technical or Business Impacts

Information exposure issues can create outsized business fallout even when the technical severity is “Medium.” If attackers can extract sensitive user or configuration data, the organization may face downstream risks such as account targeting, social engineering, and accelerated compromise attempts based on what was learned from the exposed information.

For marketing directors and business leaders, the impacts often show up as brand trust erosion (especially if giveaway/contest participants are involved), increased customer support load, and potential compliance and notification considerations depending on what data may have been exposed. Security teams may also be forced into reactive work: incident triage, log review, and stakeholder communication—pulling time from planned initiatives.

Recommended action: update Run Contests, Raffles, and Giveaways with ContestsWP to version 2.1.1 or a newer patched version to remediate CVE-2026-25023, as advised by the vendor/community source.

Similar Attacks

Unauthenticated data exposure has repeatedly been used to identify and exploit organizations at scale. Examples include:

Plex “unauthorized access” vulnerability (CVE-2023-23354) — CISA alert

Microsoft Exchange Server vulnerabilities used for widespread compromise (ProxyLogon) — CISA alert

MOVEit Transfer SQL injection exploited for data theft (CVE-2023-34362) — CVE record

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers