CVE-2026-0643: Unrestricted Upload in projectworlds House Rental and Property Listing
A flaw has been found in projectworlds House Rental and Property Listing 1.0. Impacted is an unknown function of the file /app/register.php?action=reg of the component Signup. This manipulation of the argument image causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2026-0643 is a vulnerability identified in version 1.0 of the projectworlds House Rental and Property Listing software, specifically in the signup component located at /app/register.php?action=reg. The vulnerability arises from improper handling of the 'image' parameter, which allows an attacker to upload files without restriction. This unrestricted upload flaw means that an attacker can upload malicious files, such as web shells or scripts, that could be executed on the server, leading to full system compromise. The vulnerability is remotely exploitable without any authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is low to limited but can escalate if the uploaded files are used to execute arbitrary code or pivot within the network. No official patches or updates have been linked yet, and while no active exploitation in the wild is reported, the existence of a public exploit increases the urgency for mitigation. The vulnerability affects only version 1.0 of the product, so upgrading or applying vendor patches when available is critical. The flaw is typical of insufficient input validation and lack of proper file upload controls, a common web application security issue.
Potential Impact
For European organizations using projectworlds House Rental and Property Listing 1.0, this vulnerability poses a significant risk of unauthorized access and potential system compromise. Attackers could upload malicious payloads leading to remote code execution, data theft, or service disruption. Real estate and property management companies relying on this software may face operational downtime, reputational damage, and regulatory compliance issues, especially under GDPR if personal data is exposed. The medium severity score indicates a moderate but tangible threat that could escalate if exploited in combination with other vulnerabilities. Since the exploit requires no authentication and no user interaction, the attack surface is broad, increasing the likelihood of automated attacks. Organizations in Europe with critical infrastructure or large property portfolios may be targeted to gain footholds for further attacks. The lack of current known exploitation reduces immediate risk but does not eliminate it, especially given the public exploit availability.
Mitigation Recommendations
1. Immediately restrict file upload functionality by implementing strict server-side validation to allow only specific, safe file types (e.g., images with verified MIME types and extensions). 2. Employ file content inspection and scanning for malware on all uploads. 3. Configure the web server to prevent execution of uploaded files by placing upload directories outside the web root or disabling script execution in those directories. 4. Use a web application firewall (WAF) with rules to detect and block suspicious upload attempts targeting the vulnerable endpoint. 5. Monitor logs for unusual upload activity or access patterns to /app/register.php?action=reg. 6. Isolate the application environment using containerization or network segmentation to limit potential lateral movement if compromise occurs. 7. Engage with the vendor for patches or updates and plan for an upgrade to a fixed version once available. 8. Conduct regular security assessments and penetration testing focusing on file upload mechanisms. 9. Educate development teams on secure coding practices to prevent similar vulnerabilities in future releases.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2026-0643: Unrestricted Upload in projectworlds House Rental and Property Listing
Description
A flaw has been found in projectworlds House Rental and Property Listing 1.0. Impacted is an unknown function of the file /app/register.php?action=reg of the component Signup. This manipulation of the argument image causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2026-0643 is a vulnerability identified in version 1.0 of the projectworlds House Rental and Property Listing software, specifically in the signup component located at /app/register.php?action=reg. The vulnerability arises from improper handling of the 'image' parameter, which allows an attacker to upload files without restriction. This unrestricted upload flaw means that an attacker can upload malicious files, such as web shells or scripts, that could be executed on the server, leading to full system compromise. The vulnerability is remotely exploitable without any authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is low to limited but can escalate if the uploaded files are used to execute arbitrary code or pivot within the network. No official patches or updates have been linked yet, and while no active exploitation in the wild is reported, the existence of a public exploit increases the urgency for mitigation. The vulnerability affects only version 1.0 of the product, so upgrading or applying vendor patches when available is critical. The flaw is typical of insufficient input validation and lack of proper file upload controls, a common web application security issue.
Potential Impact
For European organizations using projectworlds House Rental and Property Listing 1.0, this vulnerability poses a significant risk of unauthorized access and potential system compromise. Attackers could upload malicious payloads leading to remote code execution, data theft, or service disruption. Real estate and property management companies relying on this software may face operational downtime, reputational damage, and regulatory compliance issues, especially under GDPR if personal data is exposed. The medium severity score indicates a moderate but tangible threat that could escalate if exploited in combination with other vulnerabilities. Since the exploit requires no authentication and no user interaction, the attack surface is broad, increasing the likelihood of automated attacks. Organizations in Europe with critical infrastructure or large property portfolios may be targeted to gain footholds for further attacks. The lack of current known exploitation reduces immediate risk but does not eliminate it, especially given the public exploit availability.
Mitigation Recommendations
1. Immediately restrict file upload functionality by implementing strict server-side validation to allow only specific, safe file types (e.g., images with verified MIME types and extensions). 2. Employ file content inspection and scanning for malware on all uploads. 3. Configure the web server to prevent execution of uploaded files by placing upload directories outside the web root or disabling script execution in those directories. 4. Use a web application firewall (WAF) with rules to detect and block suspicious upload attempts targeting the vulnerable endpoint. 5. Monitor logs for unusual upload activity or access patterns to /app/register.php?action=reg. 6. Isolate the application environment using containerization or network segmentation to limit potential lateral movement if compromise occurs. 7. Engage with the vendor for patches or updates and plan for an upgrade to a fixed version once available. 8. Conduct regular security assessments and penetration testing focusing on file upload mechanisms. 9. Educate development teams on secure coding practices to prevent similar vulnerabilities in future releases.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-06T13:56:12.840Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695d9de7ee4c93a4aa9fb410
Added to database: 1/6/2026, 11:42:31 PM
Last enriched: 1/14/2026, 1:45:03 AM
Last updated: 2/4/2026, 8:28:58 PM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25514: CWE-20: Improper Input Validation in NeoRazorX facturascripts
HighCVE-2026-25513: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in NeoRazorX facturascripts
HighCVE-2026-25505: CWE-306: Missing Authentication for Critical Function in maziggy bambuddy
CriticalCVE-2025-71031: n/a
UnknownCVE-2024-37301: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in adfinis document-merge-service
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.