Description
The divi-booster WordPress plugin before 5.0.2 does not have authorization and CSRF checks in one of its fixing function, allowing unauthenticated users to modify stored divi-booster WordPress plugin before 5.0.2 options. Furthermore, due to the use of unserialize() on the data, this could be further exploited when combined with a PHP gadget chain to achieve PHP Object Injection
Published: 2026-03-11
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in the Divi Booster WordPress plugin allows an attacker to modify plugin options without authentication because the function responsible for updating settings lacks proper authorization and CSRF protection. The function also uses PHP's unserialize() on user‑supplied data. This combination enables PHP Object Injection, which can be chained with an existing gadget to execute arbitrary code on the server. The result is a high‑impact breach that allows an attacker to compromise the entire WordPress installation, including sensitive data, files, or full system control, as indicated by the CVSS score of 8.1 and the identified weaknesses CWE-502 and CWE-352.

Affected Systems

The affected product is the Divi Booster WordPress plugin from an unknown vendor. All installations running a version prior to 5.0.2 are vulnerable. No additional version details are supplied in the CNA data.

Risk and Exploitability

The vulnerability is uncovered by an unauthenticated attacker, meaning no credentials are required to exploit it. The CVSS score of 8.1 classifies it as high severity. The EPSS score of less than 1% suggests limited exploitation probability, and it is not listed in the CISA KEV catalog. Nevertheless, because the path to exploitation is straightforward—sending a crafted payload to the vulnerable function and leveraging a gadget chain—security teams should treat it as high risk and act promptly. The plain web interface can be abused directly, making the attack vector remote and user‑friendly.

Generated by OpenCVE AI on March 17, 2026 at 15:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Divi Booster to version 5.0.2 or later
  • If an upgrade is not possible, remove the plugin or disable its functionality
  • Restrict administrative access to WordPress by IP address or network segmentation
  • Monitor web server logs for unexpected POST requests to the plugin endpoint

Generated by OpenCVE AI on March 17, 2026 at 15:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Divi-booster
Divi-booster divi-booster
Wordpress
Wordpress wordpress
Vendors & Products Divi-booster
Divi-booster divi-booster
Wordpress
Wordpress wordpress

Wed, 11 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-352
CWE-502
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description The divi-booster WordPress plugin before 5.0.2 does not have authorization and CSRF checks in one of its fixing function, allowing unauthenticated users to modify stored divi-booster WordPress plugin before 5.0.2 options. Furthermore, due to the use of unserialize() on the data, this could be further exploited when combined with a PHP gadget chain to achieve PHP Object Injection
Title Divi Booster < 5.0.2 - Unauthenticated PHP Object Injection
References

Subscriptions

Divi-booster Divi-booster
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-03-11T13:31:01.668Z

Reserved: 2026-02-17T13:22:38.616Z

Link: CVE-2026-2626

cve-icon Vulnrichment

Updated: 2026-03-11T13:28:34.723Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T06:17:14.353

Modified: 2026-03-11T14:16:27.227

Link: CVE-2026-2626

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:37:45Z

Weaknesses