Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3759: SQL Injection in projectworlds Online Art Gallery Shop

0
Medium
VulnerabilityCVE-2026-3759cvecve-2026-3759
Published: Sun Mar 08 2026 (03/08/2026, 18:02:11 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: Online Art Gallery Shop

Description

A security vulnerability has been detected in projectworlds Online Art Gallery Shop 1.0. This affects an unknown part of the file /admin/adminHome.php. Such manipulation of the argument reach_nm leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 03/08/2026, 18:37:00 UTC

Technical Analysis

CVE-2026-3759 identifies a SQL injection vulnerability in projectworlds Online Art Gallery Shop version 1.0, located in the /admin/adminHome.php file. The vulnerability stems from improper handling of the 'reach_nm' argument, which is susceptible to SQL injection attacks. This flaw allows remote attackers to manipulate SQL queries executed by the application without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The vulnerability impacts the confidentiality, integrity, and availability of the database, though only to a limited extent (VC:L, VI:L, VA:L). The CVSS score of 6.9 (medium severity) reflects this moderate risk. No patches or fixes have been publicly linked, and no known exploits are currently active in the wild, but public disclosure increases the risk of future exploitation. The vulnerability likely arises from concatenating user input directly into SQL statements without proper sanitization or use of parameterized queries. Exploiting this vulnerability could allow attackers to extract sensitive data, modify database contents, or disrupt service availability. The affected product is a specialized e-commerce platform for art galleries, which may limit the number of impacted organizations but still poses a significant risk to those using it. The vulnerability highlights the importance of secure coding practices in web applications, especially those handling administrative functions.

Potential Impact

The SQL injection vulnerability in projectworlds Online Art Gallery Shop 1.0 can lead to unauthorized data access, data manipulation, and potential denial of service. Attackers can remotely execute arbitrary SQL commands, potentially extracting sensitive customer or business data, altering records, or corrupting the database. This compromises confidentiality, integrity, and availability of the affected system. Since the vulnerability requires no authentication or user interaction, it is relatively easy to exploit, increasing risk. Organizations using this software may suffer data breaches, financial losses, reputational damage, and operational disruptions. Although the product is niche, any compromised art gallery shop could expose customer personal information and payment details. The lack of known exploits in the wild currently reduces immediate risk, but public disclosure means attackers may develop exploits soon. The impact is thus moderate but could escalate if exploited at scale or combined with other vulnerabilities.

Mitigation Recommendations

To mitigate CVE-2026-3759, organizations should immediately review and update the code handling the 'reach_nm' parameter in /admin/adminHome.php. Specifically, replace any dynamic SQL query construction with parameterized queries or prepared statements to prevent injection. Implement rigorous input validation and sanitization to reject or neutralize malicious input. Conduct a comprehensive security audit of the entire codebase to identify and remediate similar injection flaws. If vendor patches become available, apply them promptly. In the absence of official patches, consider deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this parameter. Limit administrative interface exposure by restricting access via IP whitelisting or VPN. Monitor logs for suspicious database queries or unusual activity patterns. Educate developers on secure coding practices to prevent future injection vulnerabilities. Finally, maintain regular backups of databases to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-07T20:34:12.564Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69adbe762904315ca3d63bfa

Added to database: 3/8/2026, 6:22:46 PM

Last enriched: 3/8/2026, 6:37:00 PM

Last updated: 3/11/2026, 6:49:10 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses