CVE-2026-3758: SQL Injection in projectworlds Online Art Gallery Shop
A weakness has been identified in projectworlds Online Art Gallery Shop 1.0. Affected by this issue is some unknown functionality of the file /admin/adminHome.php. This manipulation of the argument Info causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
AI Analysis
Technical Summary
CVE-2026-3758 identifies a SQL injection vulnerability in projectworlds Online Art Gallery Shop version 1.0, specifically within the /admin/adminHome.php script. The vulnerability arises from insufficient input validation or sanitization of the 'Info' parameter, which is directly incorporated into SQL queries. This allows an unauthenticated remote attacker to inject arbitrary SQL commands, potentially manipulating the underlying database. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with attack vector as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The scope remains unchanged (S:U). The exploit is publicly available, although no active exploitation has been reported yet. This vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt service availability. The affected product is a niche online art gallery e-commerce platform, which may be used by small to medium enterprises or art vendors. No official patches have been linked yet, increasing the urgency for mitigation. The vulnerability highlights the critical need for secure coding practices, especially in administrative interfaces that control backend operations.
Potential Impact
The SQL injection vulnerability allows attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data modification, or deletion. This compromises confidentiality, integrity, and availability of the affected system's data. For organizations, this could mean exposure of customer information, financial records, or intellectual property related to art sales. Attackers could also disrupt business operations by corrupting or deleting critical data. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely and easily, increasing the risk of automated attacks or mass scanning. The availability of a public exploit further raises the threat level, as less skilled attackers can leverage it. Organizations relying on this software for online sales or inventory management may face reputational damage, regulatory penalties, and financial losses if exploited. The impact is especially significant for businesses in the art and e-commerce sectors that handle sensitive customer and transaction data.
Mitigation Recommendations
1. Immediate mitigation should include implementing strict input validation and parameterized queries or prepared statements in the /admin/adminHome.php script to prevent SQL injection. 2. Deploy a Web Application Firewall (WAF) configured to detect and block SQL injection patterns targeting the 'Info' parameter. 3. Restrict access to the /admin directory by IP whitelisting or VPN to limit exposure of the vulnerable interface. 4. Monitor database logs and web server logs for unusual query patterns or repeated failed attempts indicative of injection attempts. 5. If patching is not yet available, consider isolating the affected system or disabling the vulnerable functionality temporarily. 6. Conduct a thorough security audit of the entire application to identify and remediate other potential injection points. 7. Educate developers on secure coding practices, emphasizing the use of parameterized queries and input sanitization. 8. Regularly update and patch the software once official fixes are released by the vendor. 9. Implement least privilege principles for database accounts used by the application to limit potential damage. 10. Backup critical data regularly to enable recovery in case of data corruption or deletion.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, India, Netherlands, Italy, Spain
CVE-2026-3758: SQL Injection in projectworlds Online Art Gallery Shop
Description
A weakness has been identified in projectworlds Online Art Gallery Shop 1.0. Affected by this issue is some unknown functionality of the file /admin/adminHome.php. This manipulation of the argument Info causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
AI-Powered Analysis
Technical Analysis
CVE-2026-3758 identifies a SQL injection vulnerability in projectworlds Online Art Gallery Shop version 1.0, specifically within the /admin/adminHome.php script. The vulnerability arises from insufficient input validation or sanitization of the 'Info' parameter, which is directly incorporated into SQL queries. This allows an unauthenticated remote attacker to inject arbitrary SQL commands, potentially manipulating the underlying database. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with attack vector as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The scope remains unchanged (S:U). The exploit is publicly available, although no active exploitation has been reported yet. This vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt service availability. The affected product is a niche online art gallery e-commerce platform, which may be used by small to medium enterprises or art vendors. No official patches have been linked yet, increasing the urgency for mitigation. The vulnerability highlights the critical need for secure coding practices, especially in administrative interfaces that control backend operations.
Potential Impact
The SQL injection vulnerability allows attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data modification, or deletion. This compromises confidentiality, integrity, and availability of the affected system's data. For organizations, this could mean exposure of customer information, financial records, or intellectual property related to art sales. Attackers could also disrupt business operations by corrupting or deleting critical data. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely and easily, increasing the risk of automated attacks or mass scanning. The availability of a public exploit further raises the threat level, as less skilled attackers can leverage it. Organizations relying on this software for online sales or inventory management may face reputational damage, regulatory penalties, and financial losses if exploited. The impact is especially significant for businesses in the art and e-commerce sectors that handle sensitive customer and transaction data.
Mitigation Recommendations
1. Immediate mitigation should include implementing strict input validation and parameterized queries or prepared statements in the /admin/adminHome.php script to prevent SQL injection. 2. Deploy a Web Application Firewall (WAF) configured to detect and block SQL injection patterns targeting the 'Info' parameter. 3. Restrict access to the /admin directory by IP whitelisting or VPN to limit exposure of the vulnerable interface. 4. Monitor database logs and web server logs for unusual query patterns or repeated failed attempts indicative of injection attempts. 5. If patching is not yet available, consider isolating the affected system or disabling the vulnerable functionality temporarily. 6. Conduct a thorough security audit of the entire application to identify and remediate other potential injection points. 7. Educate developers on secure coding practices, emphasizing the use of parameterized queries and input sanitization. 8. Regularly update and patch the software once official fixes are released by the vendor. 9. Implement least privilege principles for database accounts used by the application to limit potential damage. 10. Backup critical data regularly to enable recovery in case of data corruption or deletion.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-07T20:34:09.798Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69adbe762904315ca3d63bf0
Added to database: 3/8/2026, 6:22:46 PM
Last enriched: 3/8/2026, 6:37:13 PM
Last updated: 3/9/2026, 6:00:44 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.