Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3758: SQL Injection in projectworlds Online Art Gallery Shop

0
Medium
VulnerabilityCVE-2026-3758cvecve-2026-3758
Published: Sun Mar 08 2026 (03/08/2026, 18:02:09 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: Online Art Gallery Shop

Description

A weakness has been identified in projectworlds Online Art Gallery Shop 1.0. Affected by this issue is some unknown functionality of the file /admin/adminHome.php. This manipulation of the argument Info causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 09:11:42 UTC

Technical Analysis

CVE-2026-3758 is a SQL injection vulnerability identified in the projectworlds Online Art Gallery Shop version 1.0, affecting the /admin/adminHome.php file. The vulnerability stems from inadequate input validation or sanitization of the 'Info' parameter, which is manipulated to inject arbitrary SQL commands. This flaw allows remote attackers to execute unauthorized SQL queries on the backend database without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The impact includes potential unauthorized data disclosure, modification, or deletion, compromising confidentiality, integrity, and availability at a limited scope (VC:L/VI:L/VA:L). The exploit has been publicly disclosed, increasing the risk of exploitation, although no active exploitation has been reported yet. The vulnerability affects only version 1.0 of the product, and no official patches have been linked or published at this time. Due to the nature of the vulnerability, attackers could leverage it to extract sensitive customer or administrative data, alter records, or disrupt service operations. The vulnerability is classified as medium severity with a CVSS 4.0 score of 6.9, reflecting the ease of exploitation and potential damage. The lack of authentication requirements and remote exploitability make this a significant risk for affected deployments.

Potential Impact

The SQL injection vulnerability in projectworlds Online Art Gallery Shop 1.0 can lead to unauthorized access to sensitive data such as customer information, transaction records, and administrative details. Attackers could manipulate database queries to extract confidential data, modify or delete records, or disrupt the availability of the online shop. This could result in financial losses, reputational damage, and regulatory compliance issues for organizations operating the affected software. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely by any attacker aware of the flaw, increasing the attack surface. The public availability of exploit code further elevates the risk of widespread attacks. Organizations relying on this software for e-commerce or art sales could face data breaches or operational disruptions, impacting customer trust and business continuity.

Mitigation Recommendations

To mitigate CVE-2026-3758, organizations should immediately assess whether they are running projectworlds Online Art Gallery Shop version 1.0 and restrict access to the /admin/adminHome.php endpoint, ideally limiting it to trusted IP addresses or VPNs. Implementing a Web Application Firewall (WAF) with rules to detect and block SQL injection attempts targeting the 'Info' parameter can provide a temporary protective layer. Input validation and parameterized queries should be applied to sanitize all user inputs, especially in administrative interfaces. Since no official patch is currently available, organizations should contact the vendor for updates or consider upgrading to a newer, unaffected version if available. Regularly monitoring logs for suspicious database queries or unusual admin page access can help detect exploitation attempts early. Additionally, applying the principle of least privilege to database accounts used by the application can limit the impact of a successful injection. Backup critical data frequently to enable recovery in case of data corruption or deletion.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-07T20:34:09.798Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69adbe762904315ca3d63bf0

Added to database: 3/8/2026, 6:22:46 PM

Last enriched: 3/16/2026, 9:11:42 AM

Last updated: 4/23/2026, 4:46:46 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses