CVE-2026-3759
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to remotely manipulate the online art gallery shop's database by injecting malicious SQL code through a specific part of the admin interface. To exploit this, the attacker needs access to the adminHome.php file and can target it without needing any special permissions.
Technical Description
A security vulnerability has been detected in projectworlds Online Art Gallery Shop 1.0. This affects an unknown part of the file /admin/adminHome.php. Such manipulation of the argument reach_nm leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 8, 2026
30 days ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
projectworlds
Product
online art gallery shop
Related Vulnerabilities
This vulnerability allows an attacker to manipulate a specific part of the online art gallery's admin panel to execute unauthorized database commands, potentially exposing sensitive information. The attacker can exploit this weakness remotely, meaning they don't need physical access to the system, and the method to do so is publicly available.
This vulnerability allows an attacker to remotely manipulate the online art gallery shop's database by injecting malicious SQL commands through a specific URL parameter. To exploit this flaw, the attacker needs to know how to craft the right request, which could lead to unauthorized access to sensitive data or even complete control over the database.
An attacker can remotely manipulate the registration process of the online art gallery shop to execute malicious SQL commands, potentially gaining access to sensitive data in the database. This vulnerability occurs when the attacker alters a specific input field, making it crucial for the site administrators to patch this issue promptly.