Description
A security vulnerability has been detected in projectworlds Online Art Gallery Shop 1.0. This affects an unknown part of the file /admin/adminHome.php. Such manipulation of the argument reach_nm leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-03-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection leading to potential data compromise
Action: Assess Impact
AI Analysis

Impact

A remote attacker can exploit a flaw in the adminHome.php script of projectworlds Online Art Gallery Shop 1.0 by manipulating the reach_nm argument, which bypasses input validation and allows arbitrary SQL code to be executed against the underlying database. This SQL injection can compromise data confidentiality, integrity, and availability by enabling attackers to read, modify, or delete sensitive information stored in the shop database.

Affected Systems

The vulnerability affects the projectworlds Online Art Gallery Shop, specifically version 1.0 as identified in the CPE entries. Any deployment of this version that exposes the admin panel to the Internet is potentially susceptible.

Risk and Exploitability

The CVSS score of 6.9 reflects a medium severity risk and the EPSS score of less than 1% indicates a low likelihood of widespread exploitation at this time, though the vulnerability remains publicly disclosed and could be leveraged. The lack of a KEV listing suggests no confirmed exploitation yet, but the remote nature of the attack vector and absence of mitigated input handling warrant immediate attention. Attackers could perform the exploit by supplying crafted values to the reach_nm parameter in an HTTP request directed at adminHome.php.

Generated by OpenCVE AI on April 16, 2026 at 04:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the projectworlds Online Art Gallery Shop to the latest version that includes a fix for the SQL injection vulnerability.
  • Rewrite the adminHome.php script to use parameterized queries or prepared statements for any database interaction involving the reach_nm parameter, and validate that the value conforms to expected formats.
  • Configure the database user account used by the application with the least privileges necessary, so that even if an injection succeeds, the damage is limited.

Generated by OpenCVE AI on April 16, 2026 at 04:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:projectworlds:online_art_gallery_shop:1.0:*:*:*:*:*:*:*

Sun, 08 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in projectworlds Online Art Gallery Shop 1.0. This affects an unknown part of the file /admin/adminHome.php. Such manipulation of the argument reach_nm leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
Title projectworlds Online Art Gallery Shop adminHome.php sql injection
First Time appeared Projectworlds
Projectworlds online Art Gallery Shop
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:projectworlds:online_art_gallery_shop:*:*:*:*:*:*:*:*
Vendors & Products Projectworlds
Projectworlds online Art Gallery Shop
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Projectworlds Online Art Gallery Shop
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T19:24:06.077Z

Reserved: 2026-03-07T20:34:12.564Z

Link: CVE-2026-3759

cve-icon Vulnrichment

Updated: 2026-03-11T19:24:00.291Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T19:16:00.963

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3759

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:15:24Z

Weaknesses