CVE-2026-3406
Plain English Summary
AI-powered analysis for quick understanding
An attacker can remotely manipulate the registration process of the online art gallery shop to execute malicious SQL commands, potentially gaining access to sensitive data in the database. This vulnerability occurs when the attacker alters a specific input field, making it crucial for the site administrators to patch this issue promptly.
Technical Description
A vulnerability was found in projectworlds Online Art Gallery Shop 1.0. The impacted element is an unknown function of the file /admin/registration.php of the component Registration Handler. The manipulation of the argument fname results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 2, 2026
about 1 month ago
Last Modified
Mar 3, 2026
about 1 month ago
Vendor
projectworlds
Product
online art gallery shop
Related Vulnerabilities
This vulnerability allows an attacker to remotely manipulate the online art gallery shop's database by injecting malicious SQL code through a specific part of the admin interface. To exploit this, the attacker needs access to the adminHome.php file and can target it without needing any special permissions.
This vulnerability allows an attacker to manipulate a specific part of the online art gallery's admin panel to execute unauthorized database commands, potentially exposing sensitive information. The attacker can exploit this weakness remotely, meaning they don't need physical access to the system, and the method to do so is publicly available.
This vulnerability allows an attacker to remotely manipulate the online art gallery shop's database by injecting malicious SQL commands through a specific URL parameter. To exploit this flaw, the attacker needs to know how to craft the right request, which could lead to unauthorized access to sensitive data or even complete control over the database.