Boost WordPress Plugin Vulnerable to PHP Object Injection
The National Vulnerability Database reports a critical PHP Object Injection vulnerability, CVE-2026-7637, affecting the Boost plugin for WordPress, versions up to and including 2.0.3. This flaw stems from insecure deserialization of untrusted input found in the STYXKEY-BOOST_USER_LOCATION cookie. Unauthenticated attackers can exploit this to inject a PHP Object.
Critically, while the Boost plugin itself lacks a direct Property-Oriented Programming (POP) chain, the vulnerability becomes highly exploitable if another plugin or theme on the WordPress site does contain one. Should such a POP chain exist, attackers could leverage it to achieve significant impact, including arbitrary file deletion, sensitive data exfiltration, or even remote code execution, depending on the specific POP chain present.
This vulnerability carries a CVSS score of 9.8 (CRITICAL), underscoring the severe risk. Defenders must understand that while Boost is the entry point, the true impact hinges on the broader plugin ecosystem within their WordPress deployments. It’s a supply chain problem at the application layer.
What This Means For You
- If your organization uses the Boost plugin for WordPress, you are exposed. The immediate action is to review your WordPress installations, identify Boost plugin usage, and assess all other installed plugins and themes for potential POP chain vulnerabilities. Even without a known POP chain in Boost itself, the critical CVSS score means this is not a vulnerability to ignore. Patch or disable immediately.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7637 - Boost WordPress Plugin PHP Object Injection via Cookie
title: CVE-2026-7637 - Boost WordPress Plugin PHP Object Injection via Cookie
id: scw-2026-05-20-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-7637 by looking for requests to the Boost WordPress plugin directory containing the vulnerable 'STYXKEY-BOOST_USER_LOCATION' cookie. This cookie is used for PHP Object Injection via deserialization.
author: SCW Feed Engine (AI-generated)
date: 2026-05-20
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7637/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/wp-content/plugins/boost/'
cs-method:
- 'GET'
cs-uri-query|contains:
- 'STYXKEY-BOOST_USER_LOCATION='
selection_cookie_value:
cs-uri-query|contains:
- 'STYXKEY-BOOST_USER_LOCATION='
condition: selection AND selection_cookie_value
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7637 | Deserialization | Boost plugin for WordPress versions <= 2.0.3 |
| CVE-2026-7637 | PHP Object Injection | Deserialization of untrusted input in STYXKEY-BOOST_USER_LOCATION cookie |
| CVE-2026-7637 | RCE | Requires additional plugin/theme with POP chain for impact (e.g., arbitrary file deletion, sensitive data retrieval, code execution) |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 20, 2026 at 07:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.