CVE-2026-3759: SQL Injection in projectworlds Online Art Gallery Shop
A security vulnerability has been detected in projectworlds Online Art Gallery Shop 1.0. This affects an unknown part of the file /admin/adminHome.php. Such manipulation of the argument reach_nm leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2026-3759 identifies a SQL injection vulnerability in projectworlds Online Art Gallery Shop version 1.0, located in the /admin/adminHome.php file. The vulnerability stems from improper handling of the 'reach_nm' argument, which is susceptible to SQL injection attacks. This flaw allows remote attackers to manipulate SQL queries executed by the application without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The vulnerability impacts the confidentiality, integrity, and availability of the database, though only to a limited extent (VC:L, VI:L, VA:L). The CVSS score of 6.9 (medium severity) reflects this moderate risk. No patches or fixes have been publicly linked, and no known exploits are currently active in the wild, but public disclosure increases the risk of future exploitation. The vulnerability likely arises from concatenating user input directly into SQL statements without proper sanitization or use of parameterized queries. Exploiting this vulnerability could allow attackers to extract sensitive data, modify database contents, or disrupt service availability. The affected product is a specialized e-commerce platform for art galleries, which may limit the number of impacted organizations but still poses a significant risk to those using it. The vulnerability highlights the importance of secure coding practices in web applications, especially those handling administrative functions.
Potential Impact
The SQL injection vulnerability in projectworlds Online Art Gallery Shop 1.0 can lead to unauthorized data access, data manipulation, and potential denial of service. Attackers can remotely execute arbitrary SQL commands, potentially extracting sensitive customer or business data, altering records, or corrupting the database. This compromises confidentiality, integrity, and availability of the affected system. Since the vulnerability requires no authentication or user interaction, it is relatively easy to exploit, increasing risk. Organizations using this software may suffer data breaches, financial losses, reputational damage, and operational disruptions. Although the product is niche, any compromised art gallery shop could expose customer personal information and payment details. The lack of known exploits in the wild currently reduces immediate risk, but public disclosure means attackers may develop exploits soon. The impact is thus moderate but could escalate if exploited at scale or combined with other vulnerabilities.
Mitigation Recommendations
To mitigate CVE-2026-3759, organizations should immediately review and update the code handling the 'reach_nm' parameter in /admin/adminHome.php. Specifically, replace any dynamic SQL query construction with parameterized queries or prepared statements to prevent injection. Implement rigorous input validation and sanitization to reject or neutralize malicious input. Conduct a comprehensive security audit of the entire codebase to identify and remediate similar injection flaws. If vendor patches become available, apply them promptly. In the absence of official patches, consider deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this parameter. Limit administrative interface exposure by restricting access via IP whitelisting or VPN. Monitor logs for suspicious database queries or unusual activity patterns. Educate developers on secure coding practices to prevent future injection vulnerabilities. Finally, maintain regular backups of databases to enable recovery in case of compromise.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Japan
CVE-2026-3759: SQL Injection in projectworlds Online Art Gallery Shop
Description
A security vulnerability has been detected in projectworlds Online Art Gallery Shop 1.0. This affects an unknown part of the file /admin/adminHome.php. Such manipulation of the argument reach_nm leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2026-3759 identifies a SQL injection vulnerability in projectworlds Online Art Gallery Shop version 1.0, located in the /admin/adminHome.php file. The vulnerability stems from improper handling of the 'reach_nm' argument, which is susceptible to SQL injection attacks. This flaw allows remote attackers to manipulate SQL queries executed by the application without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The vulnerability impacts the confidentiality, integrity, and availability of the database, though only to a limited extent (VC:L, VI:L, VA:L). The CVSS score of 6.9 (medium severity) reflects this moderate risk. No patches or fixes have been publicly linked, and no known exploits are currently active in the wild, but public disclosure increases the risk of future exploitation. The vulnerability likely arises from concatenating user input directly into SQL statements without proper sanitization or use of parameterized queries. Exploiting this vulnerability could allow attackers to extract sensitive data, modify database contents, or disrupt service availability. The affected product is a specialized e-commerce platform for art galleries, which may limit the number of impacted organizations but still poses a significant risk to those using it. The vulnerability highlights the importance of secure coding practices in web applications, especially those handling administrative functions.
Potential Impact
The SQL injection vulnerability in projectworlds Online Art Gallery Shop 1.0 can lead to unauthorized data access, data manipulation, and potential denial of service. Attackers can remotely execute arbitrary SQL commands, potentially extracting sensitive customer or business data, altering records, or corrupting the database. This compromises confidentiality, integrity, and availability of the affected system. Since the vulnerability requires no authentication or user interaction, it is relatively easy to exploit, increasing risk. Organizations using this software may suffer data breaches, financial losses, reputational damage, and operational disruptions. Although the product is niche, any compromised art gallery shop could expose customer personal information and payment details. The lack of known exploits in the wild currently reduces immediate risk, but public disclosure means attackers may develop exploits soon. The impact is thus moderate but could escalate if exploited at scale or combined with other vulnerabilities.
Mitigation Recommendations
To mitigate CVE-2026-3759, organizations should immediately review and update the code handling the 'reach_nm' parameter in /admin/adminHome.php. Specifically, replace any dynamic SQL query construction with parameterized queries or prepared statements to prevent injection. Implement rigorous input validation and sanitization to reject or neutralize malicious input. Conduct a comprehensive security audit of the entire codebase to identify and remediate similar injection flaws. If vendor patches become available, apply them promptly. In the absence of official patches, consider deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this parameter. Limit administrative interface exposure by restricting access via IP whitelisting or VPN. Monitor logs for suspicious database queries or unusual activity patterns. Educate developers on secure coding practices to prevent future injection vulnerabilities. Finally, maintain regular backups of databases to enable recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-07T20:34:12.564Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69adbe762904315ca3d63bfa
Added to database: 3/8/2026, 6:22:46 PM
Last enriched: 3/8/2026, 6:37:00 PM
Last updated: 3/11/2026, 6:49:10 AM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.