CVE-2026-9010

HIGH

Boost <= 2.0.3 - Unauthenticated Blind SQL Injection via Multiple Parameters

Title source: cna
STIX 2.1

Description

The Boost plugin for WordPress is vulnerable to time-based SQL Injection via the 'current_url' and 'user_name' parameters in versions up to, and including, 2.0.3 due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL queries. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Scores

CVSS v3 7.5
EPSS 0.0006
EPSS Percentile 19.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-89
Status published
Products (1)
PixelYourSite/Boost < 2.0.3
Published May 20, 2026
Tracked Since May 20, 2026