Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0643: Unrestricted Upload in projectworlds House Rental and Property Listing

0
Medium
VulnerabilityCVE-2026-0643cvecve-2026-0643
Published: Tue Jan 06 2026 (01/06/2026, 23:32:05 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: House Rental and Property Listing

Description

A flaw has been found in projectworlds House Rental and Property Listing 1.0. Impacted is an unknown function of the file /app/register.php?action=reg of the component Signup. This manipulation of the argument image causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been published and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 23:18:40 UTC

Technical Analysis

CVE-2026-0643 is a vulnerability identified in projectworlds House Rental and Property Listing version 1.0, specifically in the Signup component's /app/register.php?action=reg endpoint. The flaw arises from improper validation or restriction of the 'image' argument, which allows an attacker to perform unrestricted file uploads. This means an attacker can remotely upload arbitrary files, including potentially malicious scripts or executables, without needing any authentication or user interaction. The vulnerability can lead to unauthorized code execution, data manipulation, or service disruption depending on the uploaded payload and server configuration. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L/VI:L/VA:L). The vulnerability does not require any special privileges or user interaction, making it accessible to remote attackers. Although no known exploits are currently active in the wild, a proof-of-concept exploit has been published, increasing the risk of exploitation. The lack of available patches or official fixes at the time of publication necessitates immediate mitigation efforts by affected organizations. This vulnerability is particularly critical for websites and services using this software to manage user registrations and image uploads, as it can be leveraged to compromise the underlying server or application environment.

Potential Impact

The unrestricted file upload vulnerability can have significant impacts on affected organizations. Attackers can upload malicious files such as web shells, enabling remote code execution and full system compromise. This can lead to data breaches, unauthorized access to sensitive information, defacement of websites, or disruption of services. The integrity of the application and its data can be compromised, and availability may be affected if attackers deploy ransomware or denial-of-service payloads. Since the vulnerability requires no authentication or user interaction, it increases the attack surface and risk of automated exploitation. Organizations relying on projectworlds House Rental and Property Listing 1.0 for their property listing platforms may face reputational damage, regulatory penalties, and operational downtime if exploited. The medium severity rating reflects the balance between ease of exploitation and the partial impact on confidentiality, integrity, and availability, but the actual impact can escalate depending on the attacker's objectives and environment.

Mitigation Recommendations

To mitigate CVE-2026-0643, organizations should first check for any official patches or updates from projectworlds and apply them immediately once available. In the absence of patches, implement strict server-side validation of uploaded files, including verifying file types, sizes, and content signatures to prevent malicious uploads. Employ allowlists for acceptable file extensions and reject all others. Configure web servers to disallow execution of uploaded files in upload directories by setting appropriate permissions and disabling script execution. Use web application firewalls (WAFs) to detect and block suspicious upload attempts. Monitor logs for unusual upload activity and conduct regular security audits of the application. Consider isolating the upload functionality in a sandboxed environment to limit potential damage. Educate developers and administrators about secure file upload practices and review the application code for similar vulnerabilities. Finally, implement network segmentation and least privilege principles to reduce the impact of a potential compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-06T13:56:12.840Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695d9de7ee4c93a4aa9fb410

Added to database: 1/6/2026, 11:42:31 PM

Last enriched: 2/23/2026, 11:18:40 PM

Last updated: 3/25/2026, 9:55:34 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses