CVE-2026-3758: Php
CVE-2026-3758
A weakness has been identified in projectworlds Online Art Gallery Shop 1.0. Affected by this issue is some unknown functionality of the file /admin/adminHome.php. This manipulation of the argument In...
Overview
A high-severity SQL injection vulnerability has been discovered in Projectworlds Online Art Gallery Shop version 1.0. Tracked as CVE-2026-3758, this flaw resides in the /admin/adminHome.php file. Attackers can exploit it by manipulating the “Info” argument, allowing them to execute unauthorized database commands. This vulnerability is remotely exploitable, and a public proof-of-concept exploit is available, significantly increasing the risk of active attacks.
Vulnerability Details
In simple terms, SQL injection allows an attacker to “trick” a web application into running malicious database queries. In this case, the adminHome.php file does not properly validate or sanitize user input sent via the “Info” parameter. A remote attacker can craft specific requests containing malicious SQL code. When processed, this code can interact directly with the application’s database, which typically stores sensitive information like user credentials, transaction details, and inventory data.
Impact and Risks
The successful exploitation of this vulnerability can have severe consequences:
- Data Breach: Attackers can read, modify, or delete sensitive information from the database, potentially exposing customer and administrative data. For more on the implications of data exposure, you can review recent breach reports.
- Administrative Takeover: By extracting or modifying admin credentials, attackers could gain full control of the application’s backend.
- System Compromise: In some scenarios, SQL injection can be used as a stepping stone to compromise the underlying server. Given the public availability of an exploit, unpatched systems are at immediate risk of targeted attacks.
Remediation and Mitigation
Immediate action is required to secure affected installations.
- Apply a Patch or Update: Contact the software vendor (Projectworlds) to obtain an official patch or upgraded version that addresses this vulnerability. If no patch is available, consider the following mitigations as temporary measures.
- Input Validation and Sanitization: Implement strict input validation on all user-supplied data, particularly for the “Info” parameter. Use prepared statements with parameterized queries to separate SQL code from data, which is the most effective defense against SQL injection.
- Web Application Firewall (WAF): Deploy a WAF configured with rules to block SQL injection attempts. This can help filter malicious traffic while a permanent fix is developed.
- Principle of Least Privilege: Ensure the database user account used by the application has only the minimum permissions necessary, limiting the potential damage of a successful injection.
- Monitor for Suspicious Activity: Review application and database logs for unusual queries or access patterns, especially those targeting the
adminHome.phpfile.
Stay informed about emerging threats by following the latest security news. Organizations using this software should prioritize this update to prevent potential data loss and system compromise.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A vulnerability was found in code-projects Simple Flight Ticket Booking System 1.0. This issue affects some unknown processing of the file /Adminsearch.php. The manipulation of the argument flightno r...
A security flaw has been discovered in code-projects Simple Flight Ticket Booking System 1.0. This affects an unknown function of the file /Admindelete.php. The manipulation of the argument flightno r...
A security flaw has been discovered in code-projects Simple Flight Ticket Booking System 1.0. The impacted element is an unknown function of the file /login.php. Performing a manipulation of the argum...
A weakness has been identified in code-projects Simple Flight Ticket Booking System 1.0. This affects an unknown function of the file /register.php. Executing a manipulation of the argument Username c...
Other PHP Vulnerabilities
Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kateg...
Jettweb Php Hazir Ilan Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'kat' parameter....
Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting ...
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the videoid paramet...