Description
The Boost plugin for WordPress is vulnerable to time-based SQL Injection via the 'current_url' and 'user_name' parameters in versions up to, and including, 2.0.3 due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL queries. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-05-20
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Boost plugin for WordPress contains a time‑based SQL injection flaw in the current_url and user_name parameters. Unsanitized user input is concatenated into SQL statements without proper escaping, allowing an unauthenticated attacker to inject additional SQL queries that can retrieve sensitive data from the WordPress database. This vulnerability can lead to the disclosure of user credentials, site content, and other confidential data. The weakness is an instance of CWE‑89, a classic SQL injection flaw.

Affected Systems

Vendors and products affected are PixelYourSite Boost versions 2.0.3 and earlier. No further version details are listed, so any deployment of Boost 2.0.3 or any earlier snapshot is vulnerable.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity of this defect, and no EPSS score is available. The vulnerability is not yet listed in the CISA KEV catalog, so no confirmed exploitation campaigns are reported. An attacker can exploit the flaw remotely by sending crafted requests containing SQL payloads in the current_url or user_name parameters without needing authentication. The lack of access control and input validation makes the attack straightforward for anyone who can reach the affected plugin’s endpoints.

Generated by OpenCVE AI on May 20, 2026 at 04:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Boost plugin to the latest available version (2.0.4 or later).
  • Where an immediate update is not possible, block or delete the current_url and user_name parameters from being accepted by the plugin and apply generic input validation or whitelisting for any remaining exposed parameters.
  • Enable database query logging and monitor for suspicious activity such as repeated time‑based delays or unusual SELECT statements that may indicate an active injection attempt.

Generated by OpenCVE AI on May 20, 2026 at 04:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Pixelyoursite
Pixelyoursite boost
Wordpress
Wordpress wordpress
Vendors & Products Pixelyoursite
Pixelyoursite boost
Wordpress
Wordpress wordpress

Wed, 20 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description The Boost plugin for WordPress is vulnerable to time-based SQL Injection via the 'current_url' and 'user_name' parameters in versions up to, and including, 2.0.3 due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL queries. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Boost <= 2.0.3 - Unauthenticated Blind SQL Injection via Multiple Parameters
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Pixelyoursite Boost
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-20T13:02:51.523Z

Reserved: 2026-05-19T14:11:27.229Z

Link: CVE-2026-9010

cve-icon Vulnrichment

Updated: 2026-05-20T13:01:35.003Z

cve-icon NVD

Status : Deferred

Published: 2026-05-20T04:16:59.703

Modified: 2026-05-20T13:54:54.890

Link: CVE-2026-9010

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T10:38:06Z

Weaknesses