Boost WordPress Plugin: Unauthenticated SQLi Exposes Data via current_url, user_name
The Boost plugin for WordPress, in versions up to and including 2.0.3, is vulnerable to time-based SQL Injection. The National Vulnerability Database, citing CVE-2026-9010, details that insufficient escaping of user-supplied parameters like ‘current_url’ and ‘user_name’, coupled with inadequate preparation of existing SQL queries, creates this critical flaw. This isn’t theoretical – it’s a direct path for unauthenticated attackers to manipulate existing database queries.
This vulnerability, rated 7.5 HIGH on the CVSS scale, allows attackers to append arbitrary SQL queries. The immediate consequence is the potential for extracting sensitive information directly from the underlying database. The ‘unauthenticated’ aspect is key here: it means attackers don’t need any prior access or credentials to exploit this, significantly lowering the bar for compromise. This isn’t some complex zero-day requiring deep network access; it’s a web-facing flaw that any script kiddie can leverage.
For defenders, this is a clear and present danger to any WordPress site running the affected Boost plugin. The attacker’s calculus is simple: find a vulnerable site, craft a malicious URL, and start dumping data. The lack of specification on affected products by the National Vulnerability Database means anyone using this plugin must assume they are exposed.
What This Means For You
- If your organization uses the Boost plugin for WordPress, you are exposed to unauthenticated SQL injection. This isn't a future threat; it's exploitable now. Identify all instances of the Boost plugin, verify their versions, and prioritize patching or disabling if updates aren't immediately available. Audit your WordPress database access logs for any anomalous queries or data exfiltration attempts.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-9010 - Boost WordPress Plugin Unauthenticated SQL Injection
title: CVE-2026-9010 - Boost WordPress Plugin Unauthenticated SQL Injection
id: scw-2026-05-20-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit the 'current_url' and 'user_name' parameters in the Boost WordPress plugin (versions up to 2.0.3) for SQL injection. This rule specifically looks for the plugin's directory in the URI and the vulnerable parameters in the query string, indicating a potential exploitation attempt for CVE-2026-9010.
author: SCW Feed Engine (AI-generated)
date: 2026-05-20
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-9010/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/wp-content/plugins/boost/'
cs-uri-query|contains:
- 'current_url='
- 'user_name='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-9010 | SQLi | Boost plugin for WordPress versions <= 2.0.3 |
| CVE-2026-9010 | SQLi | Vulnerable parameters: 'current_url', 'user_name' |
| CVE-2026-9010 | SQLi | Attack vector: time-based SQL Injection |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 20, 2026 at 07:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.