Description
A security flaw has been discovered in projectworlds Online Art Gallery Shop 1.0. Affected by this vulnerability is an unknown functionality of the file /?pass=1. The manipulation of the argument fnm results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-03-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection that can lead to unauthorized data access or modification
Action: Immediate Patch
AI Analysis

Impact

A vulnerability exists in the Online Art Gallery Shop 1.0 where the query parameter "fnm" in the "/?pass=1" request can be manipulated to inject arbitrary SQL code. This flaw permits an attacker to execute unauthorized SQL statements against the underlying database, potentially exposing sensitive data, altering records, or disabling application functionality. The description notes that the attack can be launched remotely and that a public exploit is available, indicating that an external actor can target a publicly reachable instance without needing privileged access.

Affected Systems

The flaw is limited to projectworlds Online Art Gallery Shop version 1.0, specifically the "/?pass=1" endpoint whose functionality has not been fully documented. No other product versions or vendor products are explicitly listed as affected in the available data.

Risk and Exploitability

The CVSS score is 6.9, reflecting moderate severity. The EPSS score is reported as less than 1%, suggesting that, at the time of this assessment, the likelihood of exploitation remains low; however, the existence of a public exploit increases concern. The vulnerability is not catalogued as a Known Exploited Vulnerability. Attackers require knowledge of the vulnerable parameter and server configuration, but remote attack assumptions mean that any exposed shop instance is a potential target. The primary risk is data compromise, with possible secondary impacts if database integrity is disrupted.

Generated by OpenCVE AI on April 16, 2026 at 04:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch or upgrade to a version that contains the fix for the /?pass=1 endpoint if available.
  • If a patch is not yet available, restrict the "fnm" parameter to a whitelist of expected values or remove the parameter entirely, and use a web application firewall rule to block SQL injection signatures for that endpoint.
  • Configure the database account used by the application with the least privileges required (e.g., read‑only or limited write) so that even if injection succeeds, the attacker’s ability to damage data is constrained.

Generated by OpenCVE AI on April 16, 2026 at 04:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:projectworlds:online_art_gallery_shop:1.0:*:*:*:*:*:*:*

Sun, 08 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in projectworlds Online Art Gallery Shop 1.0. Affected by this vulnerability is an unknown functionality of the file /?pass=1. The manipulation of the argument fnm results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Title projectworlds Online Art Gallery Shop pass sql injection
First Time appeared Projectworlds
Projectworlds online Art Gallery Shop
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:projectworlds:online_art_gallery_shop:*:*:*:*:*:*:*:*
Vendors & Products Projectworlds
Projectworlds online Art Gallery Shop
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Projectworlds Online Art Gallery Shop
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T19:32:00.520Z

Reserved: 2026-03-07T20:34:06.577Z

Link: CVE-2026-3757

cve-icon Vulnrichment

Updated: 2026-03-11T19:31:57.923Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T19:16:00.500

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3757

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:15:24Z

Weaknesses