CVE-2026-3758
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to manipulate a specific part of the online art gallery's admin panel to execute unauthorized database commands, potentially exposing sensitive information. The attacker can exploit this weakness remotely, meaning they don't need physical access to the system, and the method to do so is publicly available.
Technical Description
A weakness has been identified in projectworlds Online Art Gallery Shop 1.0. Affected by this issue is some unknown functionality of the file /admin/adminHome.php. This manipulation of the argument Info causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 8, 2026
about 1 month ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
projectworlds
Product
online art gallery shop
Related Vulnerabilities
This vulnerability allows an attacker to remotely manipulate the online art gallery shop's database by injecting malicious SQL code through a specific part of the admin interface. To exploit this, the attacker needs access to the adminHome.php file and can target it without needing any special permissions.
This vulnerability allows an attacker to remotely manipulate the online art gallery shop's database by injecting malicious SQL commands through a specific URL parameter. To exploit this flaw, the attacker needs to know how to craft the right request, which could lead to unauthorized access to sensitive data or even complete control over the database.
An attacker can remotely manipulate the registration process of the online art gallery shop to execute malicious SQL commands, potentially gaining access to sensitive data in the database. This vulnerability occurs when the attacker alters a specific input field, making it crucial for the site administrators to patch this issue promptly.