CVE-2026-9010 PUBLISHED

Boost <= 2.0.3 - Unauthenticated Blind SQL Injection via Multiple Parameters

Assigner: Wordfence
Reserved: 19.05.2026 Published: 20.05.2026 Updated: 20.05.2026

The Boost plugin for WordPress is vulnerable to time-based SQL Injection via the 'current_url' and 'user_name' parameters in versions up to, and including, 2.0.3 due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL queries. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS Score: 7.5

Product Status

Vendor PixelYourSite
Product Boost
Versions Default: unaffected
  • affected from 0 to 2.0.3 (incl.)

Credits

  • Osvaldo Noe Gonzalez Del Rio finder

References

Problem Types

  • CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE