CVE-2026-3759
📋 TL;DR
This SQL injection vulnerability in projectworlds Online Art Gallery Shop 1.0 allows remote attackers to execute arbitrary SQL commands via the reach_nm parameter in /admin/adminHome.php. This affects all installations of version 1.0 that have the admin interface accessible. Attackers can potentially read, modify, or delete database content.
💻 Affected Systems
- projectworlds Online Art Gallery Shop
📦 What is this software?
Online Art Gallery Shop by Projectworlds
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including credential theft, data destruction, and potential server takeover via SQL injection leading to remote code execution.
Likely Case
Unauthorized data access, privilege escalation, and potential administrative account takeover.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only error messages or limited data exposure.
🎯 Exploit Status
Public exploit available on GitHub. SQL injection via GET/POST parameter manipulation is straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None found
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available, or implement workarounds.
🔧 Temporary Workarounds
Input Validation and Sanitization
allAdd parameter validation and sanitization for reach_nm parameter in adminHome.php
Edit /admin/adminHome.php to add input validation using prepared statements or parameterized queries
Web Application Firewall Rules
allBlock SQL injection patterns targeting reach_nm parameter
Add WAF rule: deny requests containing SQL keywords in reach_nm parameter
🧯 If You Can't Patch
- Restrict access to /admin/ directory to trusted IP addresses only
- Disable or remove the admin interface if not required
🔍 How to Verify
Check if Vulnerable:
Test /admin/adminHome.php with SQL injection payloads in reach_nm parameter (e.g., reach_nm=' OR '1'='1)
Check Version:
Check application version in configuration files or admin panel
Verify Fix Applied:
Test with same payloads and verify no SQL errors or unexpected behavior
📡 Detection & Monitoring
Log Indicators:
- SQL syntax errors in web server logs
- Unusual database queries from web application
- Multiple failed login attempts to admin interface
Network Indicators:
- HTTP requests to /admin/adminHome.php with SQL keywords in parameters
- Unusual database traffic patterns
SIEM Query:
source="web_server" AND (uri="/admin/adminHome.php" AND (param="reach_nm" AND value CONTAINS "UNION" OR value CONTAINS "SELECT" OR value CONTAINS "OR"))