Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0643: Unrestricted Upload in projectworlds House Rental and Property Listing

0
Medium
VulnerabilityCVE-2026-0643cvecve-2026-0643
Published: Tue Jan 06 2026 (01/06/2026, 23:32:05 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: House Rental and Property Listing

Description

A flaw has been found in projectworlds House Rental and Property Listing 1.0. Impacted is an unknown function of the file /app/register.php?action=reg of the component Signup. This manipulation of the argument image causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:45:03 UTC

Technical Analysis

CVE-2026-0643 is a vulnerability identified in version 1.0 of the projectworlds House Rental and Property Listing software, specifically in the signup component located at /app/register.php?action=reg. The vulnerability arises from improper handling of the 'image' parameter, which allows an attacker to upload files without restriction. This unrestricted upload flaw means that an attacker can upload malicious files, such as web shells or scripts, that could be executed on the server, leading to full system compromise. The vulnerability is remotely exploitable without any authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is low to limited but can escalate if the uploaded files are used to execute arbitrary code or pivot within the network. No official patches or updates have been linked yet, and while no active exploitation in the wild is reported, the existence of a public exploit increases the urgency for mitigation. The vulnerability affects only version 1.0 of the product, so upgrading or applying vendor patches when available is critical. The flaw is typical of insufficient input validation and lack of proper file upload controls, a common web application security issue.

Potential Impact

For European organizations using projectworlds House Rental and Property Listing 1.0, this vulnerability poses a significant risk of unauthorized access and potential system compromise. Attackers could upload malicious payloads leading to remote code execution, data theft, or service disruption. Real estate and property management companies relying on this software may face operational downtime, reputational damage, and regulatory compliance issues, especially under GDPR if personal data is exposed. The medium severity score indicates a moderate but tangible threat that could escalate if exploited in combination with other vulnerabilities. Since the exploit requires no authentication and no user interaction, the attack surface is broad, increasing the likelihood of automated attacks. Organizations in Europe with critical infrastructure or large property portfolios may be targeted to gain footholds for further attacks. The lack of current known exploitation reduces immediate risk but does not eliminate it, especially given the public exploit availability.

Mitigation Recommendations

1. Immediately restrict file upload functionality by implementing strict server-side validation to allow only specific, safe file types (e.g., images with verified MIME types and extensions). 2. Employ file content inspection and scanning for malware on all uploads. 3. Configure the web server to prevent execution of uploaded files by placing upload directories outside the web root or disabling script execution in those directories. 4. Use a web application firewall (WAF) with rules to detect and block suspicious upload attempts targeting the vulnerable endpoint. 5. Monitor logs for unusual upload activity or access patterns to /app/register.php?action=reg. 6. Isolate the application environment using containerization or network segmentation to limit potential lateral movement if compromise occurs. 7. Engage with the vendor for patches or updates and plan for an upgrade to a fixed version once available. 8. Conduct regular security assessments and penetration testing focusing on file upload mechanisms. 9. Educate development teams on secure coding practices to prevent similar vulnerabilities in future releases.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-06T13:56:12.840Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695d9de7ee4c93a4aa9fb410

Added to database: 1/6/2026, 11:42:31 PM

Last enriched: 1/14/2026, 1:45:03 AM

Last updated: 2/4/2026, 8:28:58 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats