CVE-2026-7637
Received Received - Intake
PHP Object Injection in WordPress Boost Plugin

Publication date: 2026-05-20

Last updated on: 2026-05-20

Assigner: Wordfence

Description
The Boost plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 2.0.3 via deserialization of untrusted input in the STYXKEY-BOOST_USER_LOCATION cookie. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-20
Last Modified
2026-05-20
Generated
2026-05-20
AI Q&A
2026-05-20
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
boost plugin to 2.0.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to potentially retrieve sensitive data if a POP chain is present via an additional plugin or theme. This exposure of sensitive data could impact compliance with regulations such as GDPR and HIPAA, which require protection of personal and sensitive information.

However, the vulnerability itself requires the presence of another plugin or theme containing a POP chain to be exploitable, meaning the risk depends on the overall system configuration.


Can you explain this vulnerability to me?

The Boost plugin for WordPress versions up to and including 2.0.3 is vulnerable to PHP Object Injection through the deserialization of untrusted input in the STYXKEY-BOOST_USER_LOCATION cookie.

This vulnerability allows unauthenticated attackers to inject a PHP Object into the application.

However, the vulnerability itself has no direct impact unless another plugin or theme containing a Property Oriented Programming (POP) chain is installed on the site.

If such a POP chain is present via an additional plugin or theme, the attacker may be able to perform malicious actions like deleting arbitrary files, retrieving sensitive data, or executing code depending on the POP chain.


How can this vulnerability impact me? :

If your WordPress site uses the Boost plugin version 2.0.3 or earlier and also has another plugin or theme that contains a POP chain, an attacker could exploit this vulnerability to:

  • Delete arbitrary files on your server.
  • Retrieve sensitive data stored on your site.
  • Execute arbitrary code, potentially taking control of your site.

Without a POP chain present, this vulnerability does not have an impact.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves the deserialization of untrusted input in the STYXKEY-BOOST_USER_LOCATION cookie in the Boost plugin for WordPress. Detection would involve monitoring HTTP requests for the presence of this specific cookie carrying suspicious serialized PHP objects.

You can inspect incoming HTTP requests to your WordPress site for the STYXKEY-BOOST_USER_LOCATION cookie using network monitoring tools or web server logs.

Example commands to detect this cookie in web server logs or live traffic include:

  • Using grep on Apache or Nginx access logs to find requests containing the cookie: grep 'STYXKEY-BOOST_USER_LOCATION' /var/log/apache2/access.log
  • Using tcpdump to capture HTTP traffic and filter for the cookie: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'STYXKEY-BOOST_USER_LOCATION'
  • Using a web application firewall (WAF) or intrusion detection system (IDS) to alert on requests containing this cookie with serialized PHP objects.

Note that detection effectiveness depends on the presence of a POP chain in other plugins or themes, as the vulnerability alone does not cause impact.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Update the Boost plugin to a version later than 2.0.3 where this vulnerability is fixed.
  • If updating is not immediately possible, consider disabling or removing the Boost plugin temporarily.
  • Review and remove any other plugins or themes that contain POP chains which could be exploited in conjunction with this vulnerability.
  • Implement web application firewall (WAF) rules to block or monitor requests containing the STYXKEY-BOOST_USER_LOCATION cookie with suspicious serialized data.
  • Monitor your site for unusual activity such as unexpected file deletions or data leaks.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart