High (7.3)

CVE-2026-3406: Php

CVE-2026-3406

A vulnerability was found in projectworlds Online Art Gallery Shop 1.0. The impacted element is an unknown function of the file /admin/registration.php of the component Registration Handler. The manip...

Affected: PHP

Overview

A critical security flaw has been identified in the ProjectWorlds Online Art Gallery Shop version 1.0. This vulnerability is a SQL Injection (SQLi) located within the administrative registration function. Specifically, the flaw exists in the fname parameter processed by the /admin/registration.php file. Attackers can exploit this weakness remotely without requiring prior authentication, posing a significant risk to affected systems.

Vulnerability Details

The vulnerability stems from improper handling of user input. The application fails to properly validate or sanitize data sent to the fname (first name) field during the admin registration process. This allows a malicious actor to inject crafted SQL commands into the database query.

Because the exploit technique is publicly available, attackers have a clear blueprint for launching attacks. The Common Vulnerability Scoring System (CVSS) rates this flaw as 7.3 (HIGH), indicating a severe risk level.

Potential Impact

If successfully exploited, this SQL injection vulnerability can have severe consequences:

  • Data Breach: Attackers can read, modify, or delete sensitive information from the application’s database, including administrator credentials, user data, and transaction records.
  • System Compromise: In some cases, SQLi can be used to bypass authentication, gain administrative control of the application, or even execute commands on the underlying server.
  • Business Disruption: Data corruption or deletion can render the online shop inoperable, leading to financial loss and reputational damage.

Remediation and Mitigation

Immediate action is required for all users of Online Art Gallery Shop 1.0.

Primary Remediation: The most effective solution is to upgrade to a patched version of the software. Contact the software vendor (ProjectWorlds) immediately to inquire about a security update or patch for this vulnerability. If no official patch is available, consider migrating to a supported and actively maintained platform.

Immediate Mitigations: If upgrading is not immediately possible, implement the following controls:

  1. Input Validation and Sanitization: Implement strict server-side validation for all user inputs, especially in the registration handler. Use parameterized queries or prepared statements for all database interactions, which is the most reliable defense against SQL injection.
  2. Network Controls: Restrict access to the /admin/ directory to only trusted IP addresses using web application firewall (WAF) rules or server configuration (e.g., .htaccess on Apache).
  3. Monitor and Audit: Closely monitor database and application logs for any unusual or suspicious SQL query patterns originating from the registration page.

General Recommendation: Discontinue the use of unsupported version 1.0. Using outdated software with known public exploits presents an unacceptable security risk.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other PHP Vulnerabilities

View all PHP vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.