Description
A flaw has been found in projectworlds House Rental and Property Listing 1.0. Impacted is an unknown function of the file /app/register.php?action=reg of the component Signup. This manipulation of the argument image causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Published: 2026-01-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

A flaw in the signup process of Projectworlds House Rental and Property Listing allows an attacker to upload arbitrary files without any restriction. Because the uploaded files can be executed, an attacker could execute malicious scripts or binaries on the server, leading to full control of the application or server. The weakness is identified as lack of proper access control and unrestricted file upload, exposing the system to potential remote code execution.

Affected Systems

The vulnerability exists in Projectworlds House Rental and Property Listing version 1.0, specifically in the register.php script when the action parameter is set to reg as part of the Signup component. No other products or versions are noted as affected.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, and the EPSS score of less than 1% suggests a low probability of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be remote, as the flaw involves a publicly accessible file upload endpoint, and an attacker could run the upload without needing local system access.

Generated by OpenCVE AI on April 18, 2026 at 08:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Restrict the types of files that can be uploaded by enforcing MIME type checks and file extension validation.
  • Store uploaded files outside the web root and ensure they are not executable by setting proper permissions.
  • Apply the vendor’s security update or patch once it becomes available, and verify that the upload functionality no longer accepts unrestricted files.

Generated by OpenCVE AI on April 18, 2026 at 08:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 15 Jan 2026 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:projectworlds:house_rental_and_property_listing_project:1.0:*:*:*:*:*:*:*

Wed, 07 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Projectworlds
Projectworlds house Rental And Property Listing Project
Vendors & Products Projectworlds
Projectworlds house Rental And Property Listing Project

Tue, 06 Jan 2026 23:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in projectworlds House Rental and Property Listing 1.0. Impacted is an unknown function of the file /app/register.php?action=reg of the component Signup. This manipulation of the argument image causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Title projectworlds House Rental and Property Listing Signup register.php unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Projectworlds House Rental And Property Listing Project
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:21:46.024Z

Reserved: 2026-01-06T13:56:12.840Z

Link: CVE-2026-0643

cve-icon Vulnrichment

Updated: 2026-01-07T16:16:16.688Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-07T12:17:07.370

Modified: 2026-01-15T21:26:03.527

Link: CVE-2026-0643

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:15:15Z

Weaknesses