Description
A vulnerability was found in projectworlds Online Art Gallery Shop 1.0. The impacted element is an unknown function of the file /admin/registration.php of the component Registration Handler. The manipulation of the argument fname results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used.
Published: 2026-03-02
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A vulnerable function in the /admin/registration.php file of projectworlds Online Art Gallery Shop allows an attacker to inject arbitrary SQL through manipulation of the fname parameter. The flaw permits remote exploitation, potentially giving an attacker access to or modification of the underlying database. This is a classic input validation weakness classified under CWE-89 (SQL Injection) and also involves improper handling of file input identified as CWE-74. The publicly available exploit documented in the community enables attackers to launch attacks without custom code.

Affected Systems

The affected product is projectworlds Online Art Gallery Shop version 1.0. No other versions are explicitly listed as vulnerable. The vulnerability is present in the Registration Handler component's admin registration endpoint.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, while the EPSS score below 1% suggests a low likelihood of observed exploitation. The vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities catalog. Attackers could remotely submit a crafted fname value to the registration endpoint, exploiting the injection flaw to read or alter data. The public availability of an exploit increases the risk, even though the EPSS suggests low exploitation frequency.

Generated by OpenCVE AI on April 17, 2026 at 13:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑provided security patch for version 1.0 of Projectworlds Online Art Gallery Shop, or upgrade to a newer release that removes the injection vulnerability.
  • Restrict the database user privileges so that the application can only perform the actions required for normal operation, reducing the potential impact of an injection.
  • Enforce server‑side input validation and use prepared statements or parameterized queries when handling the fname field to eliminate the injection vector.

Generated by OpenCVE AI on April 17, 2026 at 13:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Projectworlds online Art Gallery Shop
CPEs cpe:2.3:a:projectworlds:online_art_gallery_shop:1.0:*:*:*:*:*:*:*
Vendors & Products Projectworlds online Art Gallery Shop

Mon, 02 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Projectworlds
Projectworlds online Art Gallery
Vendors & Products Projectworlds
Projectworlds online Art Gallery

Mon, 02 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in projectworlds Online Art Gallery Shop 1.0. The impacted element is an unknown function of the file /admin/registration.php of the component Registration Handler. The manipulation of the argument fname results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used.
Title projectworlds Online Art Gallery Shop Registration registration.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Projectworlds Online Art Gallery Online Art Gallery Shop
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-02T14:55:46.014Z

Reserved: 2026-03-01T06:58:32.508Z

Link: CVE-2026-3406

cve-icon Vulnrichment

Updated: 2026-03-02T14:55:26.048Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-02T03:16:01.357

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3406

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T13:45:16Z

Weaknesses