CVE-2026-7637
PHP Object Injection in WordPress Boost Plugin
Publication date: 2026-05-20
Last updated on: 2026-05-20
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| boost | plugin | to 2.0.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to potentially retrieve sensitive data if a POP chain is present via an additional plugin or theme. This exposure of sensitive data could impact compliance with regulations such as GDPR and HIPAA, which require protection of personal and sensitive information.
However, the vulnerability itself requires the presence of another plugin or theme containing a POP chain to be exploitable, meaning the risk depends on the overall system configuration.
Can you explain this vulnerability to me?
The Boost plugin for WordPress versions up to and including 2.0.3 is vulnerable to PHP Object Injection through the deserialization of untrusted input in the STYXKEY-BOOST_USER_LOCATION cookie.
This vulnerability allows unauthenticated attackers to inject a PHP Object into the application.
However, the vulnerability itself has no direct impact unless another plugin or theme containing a Property Oriented Programming (POP) chain is installed on the site.
If such a POP chain is present via an additional plugin or theme, the attacker may be able to perform malicious actions like deleting arbitrary files, retrieving sensitive data, or executing code depending on the POP chain.
How can this vulnerability impact me? :
If your WordPress site uses the Boost plugin version 2.0.3 or earlier and also has another plugin or theme that contains a POP chain, an attacker could exploit this vulnerability to:
- Delete arbitrary files on your server.
- Retrieve sensitive data stored on your site.
- Execute arbitrary code, potentially taking control of your site.
Without a POP chain present, this vulnerability does not have an impact.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves the deserialization of untrusted input in the STYXKEY-BOOST_USER_LOCATION cookie in the Boost plugin for WordPress. Detection would involve monitoring HTTP requests for the presence of this specific cookie carrying suspicious serialized PHP objects.
You can inspect incoming HTTP requests to your WordPress site for the STYXKEY-BOOST_USER_LOCATION cookie using network monitoring tools or web server logs.
Example commands to detect this cookie in web server logs or live traffic include:
- Using grep on Apache or Nginx access logs to find requests containing the cookie: grep 'STYXKEY-BOOST_USER_LOCATION' /var/log/apache2/access.log
- Using tcpdump to capture HTTP traffic and filter for the cookie: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'STYXKEY-BOOST_USER_LOCATION'
- Using a web application firewall (WAF) or intrusion detection system (IDS) to alert on requests containing this cookie with serialized PHP objects.
Note that detection effectiveness depends on the presence of a POP chain in other plugins or themes, as the vulnerability alone does not cause impact.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include:
- Update the Boost plugin to a version later than 2.0.3 where this vulnerability is fixed.
- If updating is not immediately possible, consider disabling or removing the Boost plugin temporarily.
- Review and remove any other plugins or themes that contain POP chains which could be exploited in conjunction with this vulnerability.
- Implement web application firewall (WAF) rules to block or monitor requests containing the STYXKEY-BOOST_USER_LOCATION cookie with suspicious serialized data.
- Monitor your site for unusual activity such as unexpected file deletions or data leaks.