CVE-2026-7637 - Boost Plugin for WordPress PHP Object Injection
The Boost plugin for WordPress is vulnerable to PHP Object Injection (CVE-2026-7637) due to deserialization of untrusted input in the STYXKEY-BOOST_USER_LOCATION cookie, potentially leading to arbitrary code execution if a suitable property-oriented programming (POP) chain is present.
CVE-2026-7637 identifies a PHP Object Injection vulnerability within the Boost plugin for WordPress, affecting versions up to and including 2.0.3. The vulnerability stems from the insecure deserialization of data contained within the STYXKEY-BOOST_USER_LOCATION cookie. An unauthenticated attacker can exploit this flaw by injecting a malicious PHP object into the cookie. While the Boost plugin itself does not contain a known property-oriented programming (POP) chain, the presence of such a chain within another installed plugin or theme on the same WordPress instance can escalate the impact significantly, potentially leading to arbitrary code execution. Defenders should be aware that successful exploitation depends on the presence of a POP chain from a separate source.
Attack Chain
- An unauthenticated attacker identifies a WordPress site using a vulnerable version (<= 2.0.3) of the Boost plugin.
- The attacker crafts a malicious PHP object.
- The attacker injects the crafted PHP object into the STYXKEY-BOOST_USER_LOCATION cookie.
- The WordPress site receives the HTTP request containing the malicious cookie.
- The Boost plugin deserializes the contents of the STYXKEY-BOOST_USER_LOCATION cookie without proper sanitization.
- If a POP chain exists within another plugin or theme, the deserialized object triggers the chain.
- The POP chain executes malicious code defined by the attacker.
- The attacker achieves arbitrary code execution on the WordPress server.
Impact
Successful exploitation of CVE-2026-7637 can have severe consequences. Although the vulnerable plugin itself doesn’t provide a POP chain, the existence of one through another plugin can lead to arbitrary code execution, potentially leading to complete system compromise. An attacker could delete arbitrary files, retrieve sensitive data (e.g., database credentials), or install malicious backdoors. The impact is contingent on the availability of a usable POP chain within the WordPress installation. Given the prevalence of WordPress and its plugin ecosystem, a successful exploit could affect numerous websites.
Recommendation
- Upgrade the Boost plugin for WordPress to a version beyond 2.0.3 to patch CVE-2026-7637.
- Deploy the Sigma rule
Detect PHP Object Injection in STYXKEY-BOOST_USER_LOCATION Cookieto your SIEM to detect exploitation attempts. - Review all installed WordPress plugins and themes for potential POP chains that could be triggered by this vulnerability.
- Monitor web server logs for suspicious activity related to the STYXKEY-BOOST_USER_LOCATION cookie and potential exploitation attempts.
Detection coverage 2
Detect PHP Object Injection in STYXKEY-BOOST_USER_LOCATION Cookie
criticalDetects CVE-2026-7637 exploitation - PHP Object Injection attempts via the STYXKEY-BOOST_USER_LOCATION cookie.
Detect base64 encoded STYXKEY-BOOST_USER_LOCATION Cookie
highDetects a base64 encoded STYXKEY-BOOST_USER_LOCATION cookie. Often used to avoid signature detection.
Detection queries are available on the platform. Get full rules →