Description
A weakness has been identified in projectworlds Online Art Gallery Shop 1.0. Affected by this issue is some unknown functionality of the file /admin/adminHome.php. This manipulation of the argument Info causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection allowing remote attackers to read, modify or delete database data
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a SQL injection flaw in the adminHome.php page of the Online Art Gallery Shop application. The flaw allows an attacker to manipulate the ‘Info’ argument used in database queries, enabling the injection of arbitrary SQL statements. Because the flaw can be triggered remotely, an attacker may read, modify, or delete database contents. The CVE description does not specify whether authentication is required; based on the description, it is inferred that authentication may not be needed, but this is not explicitly stated. This weakness is categorized as CWE-74 and CWE-89.

Affected Systems

The affected product is projectworlds Online Art Gallery Shop version 1.0. This software includes the adminHome.php script that is vulnerable to the described SQL injection. No other versions or components are known to be impacted based on the current disclosure.

Risk and Exploitability

The CVSS score is 6.9, indicating a medium severity vulnerability. The EPSS score is less than 1 %, suggesting a low current probability of exploitation, but the existence of public exploit code means the risk remains non‑trivial. The flaw is not listed in CISA’s KEV catalog. Attackers can exploit the flaw by sending a crafted request to the /admin/adminHome.php page with a malicious ‘Info’ parameter. It is not explicitly stated whether authentication is required; based on the description, the flaw can be triggered remotely, suggesting that authentication may not be necessary, but this is inferred. Because the vulnerability allows injection of raw SQL, the potential impact ranges from data disclosure to full compromise of the underlying database.

Generated by OpenCVE AI on April 16, 2026 at 10:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install the vendor‑supplied patch or upgrade to a fixed version that removes the vulnerable code from adminHome.php.
  • Restrict access to the admin area by enforcing strong authentication and limiting connections to trusted IP addresses or a VPN.
  • Rewrite the application code to validate and sanitize the ‘Info’ parameter or use prepared statements/parameterized queries so that user input cannot alter SQL logic.
  • Enable detailed logging of database activity and monitor for anomalous queries to detect and respond to attempted exploitation.

Generated by OpenCVE AI on April 16, 2026 at 10:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:projectworlds:online_art_gallery_shop:1.0:*:*:*:*:*:*:*

Sun, 08 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in projectworlds Online Art Gallery Shop 1.0. Affected by this issue is some unknown functionality of the file /admin/adminHome.php. This manipulation of the argument Info causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Title projectworlds Online Art Gallery Shop adminHome.php sql injection
First Time appeared Projectworlds
Projectworlds online Art Gallery Shop
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:projectworlds:online_art_gallery_shop:*:*:*:*:*:*:*:*
Vendors & Products Projectworlds
Projectworlds online Art Gallery Shop
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Projectworlds Online Art Gallery Shop
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T19:20:45.946Z

Reserved: 2026-03-07T20:34:09.798Z

Link: CVE-2026-3758

cve-icon Vulnrichment

Updated: 2026-03-11T19:20:41.893Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T19:16:00.753

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3758

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:45:26Z

Weaknesses