CVE-2026-3406: Php
CVE-2026-3406
A vulnerability was found in projectworlds Online Art Gallery Shop 1.0. The impacted element is an unknown function of the file /admin/registration.php of the component Registration Handler. The manip...
Security Advisory: Critical SQL Injection Vulnerability in Online Art Gallery Shop 1.0
Overview
A critical security flaw has been identified in the ProjectWorlds Online Art Gallery Shop version 1.0. This vulnerability is a SQL Injection (SQLi) located within the administrative registration function. Specifically, the flaw exists in the fname parameter processed by the /admin/registration.php file. Attackers can exploit this weakness remotely without requiring prior authentication, posing a significant risk to affected systems.
Vulnerability Details
The vulnerability stems from improper handling of user input. The application fails to properly validate or sanitize data sent to the fname (first name) field during the admin registration process. This allows a malicious actor to inject crafted SQL commands into the database query.
Because the exploit technique is publicly available, attackers have a clear blueprint for launching attacks. The Common Vulnerability Scoring System (CVSS) rates this flaw as 7.3 (HIGH), indicating a severe risk level.
Potential Impact
If successfully exploited, this SQL injection vulnerability can have severe consequences:
- Data Breach: Attackers can read, modify, or delete sensitive information from the application’s database, including administrator credentials, user data, and transaction records.
- System Compromise: In some cases, SQLi can be used to bypass authentication, gain administrative control of the application, or even execute commands on the underlying server.
- Business Disruption: Data corruption or deletion can render the online shop inoperable, leading to financial loss and reputational damage.
Remediation and Mitigation
Immediate action is required for all users of Online Art Gallery Shop 1.0.
Primary Remediation: The most effective solution is to upgrade to a patched version of the software. Contact the software vendor (ProjectWorlds) immediately to inquire about a security update or patch for this vulnerability. If no official patch is available, consider migrating to a supported and actively maintained platform.
Immediate Mitigations: If upgrading is not immediately possible, implement the following controls:
- Input Validation and Sanitization: Implement strict server-side validation for all user inputs, especially in the registration handler. Use parameterized queries or prepared statements for all database interactions, which is the most reliable defense against SQL injection.
- Network Controls: Restrict access to the
/admin/directory to only trusted IP addresses using web application firewall (WAF) rules or server configuration (e.g.,.htaccesson Apache). - Monitor and Audit: Closely monitor database and application logs for any unusual or suspicious SQL query patterns originating from the registration page.
General Recommendation: Discontinue the use of unsupported version 1.0. Using outdated software with known public exploits presents an unacceptable security risk.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A vulnerability was found in code-projects Simple Flight Ticket Booking System 1.0. This issue affects some unknown processing of the file /Adminsearch.php. The manipulation of the argument flightno r...
A security flaw has been discovered in code-projects Simple Flight Ticket Booking System 1.0. This affects an unknown function of the file /Admindelete.php. The manipulation of the argument flightno r...
A security flaw has been discovered in code-projects Simple Flight Ticket Booking System 1.0. The impacted element is an unknown function of the file /login.php. Performing a manipulation of the argum...
A weakness has been identified in code-projects Simple Flight Ticket Booking System 1.0. This affects an unknown function of the file /register.php. Executing a manipulation of the argument Username c...
Other PHP Vulnerabilities
Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kateg...
Jettweb Php Hazir Ilan Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'kat' parameter....
Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting ...
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the videoid paramet...