Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Divi-booster
Divi-booster divi-booster Wordpress Wordpress wordpress |
|
| Vendors & Products |
Divi-booster
Divi-booster divi-booster Wordpress Wordpress wordpress |
Wed, 11 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-352 CWE-502 |
|
| Metrics |
cvssV3_1
|
Wed, 11 Mar 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The divi-booster WordPress plugin before 5.0.2 does not have authorization and CSRF checks in one of its fixing function, allowing unauthenticated users to modify stored divi-booster WordPress plugin before 5.0.2 options. Furthermore, due to the use of unserialize() on the data, this could be further exploited when combined with a PHP gadget chain to achieve PHP Object Injection | |
| Title | Divi Booster < 5.0.2 - Unauthenticated PHP Object Injection | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-03-11T13:31:01.668Z
Reserved: 2026-02-17T13:22:38.616Z
Link: CVE-2026-2626
Updated: 2026-03-11T13:28:34.723Z
Status : Deferred
Published: 2026-03-11T06:17:14.353
Modified: 2026-04-15T15:05:47.827
Link: CVE-2026-2626
No data.
OpenCVE Enrichment
Updated: 2026-03-20T14:37:45Z