CVE-2026-3406

MEDIUM6.9/ 10.0
Share:
Published: March 2, 2026 at 03:16 AM
Modified: March 3, 2026 at 07:46 PM
Source: cna@vuldb.com

Vulnerability Description

A vulnerability was found in projectworlds Online Art Gallery Shop 1.0. The impacted element is an unknown function of the file /admin/registration.php of the component Registration Handler. The manipulation of the argument fname results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used.

CVSS Metrics

Base Score
6.9
Severity
MEDIUM
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: cna@vuldb.com
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Critical SQL injection vulnerability exists in projectworlds Online Art Gallery Shop 1.0, allowing for remote code execution. Successful exploitation grants attackers unauthorized access to the database, potentially leading to data breaches and complete system compromise. The exploit is publicly available, increasing the risk of widespread exploitation.

02 // Vulnerability Mechanism

Step 1: Payload Delivery: The attacker crafts a malicious SQL injection payload designed to be injected into the fname parameter of the /admin/registration.php file.

Step 2: Request Submission: The attacker sends a specially crafted HTTP POST request to the vulnerable endpoint, including the malicious payload in the fname field.

Step 3: Query Execution: The application receives the request and, without proper sanitization, incorporates the attacker's payload directly into a SQL query.

Step 4: Database Interaction: The database server executes the modified SQL query, which now includes the attacker's malicious code.

Step 5: Data Extraction/Manipulation: Depending on the payload, the attacker can extract sensitive data (e.g., usernames, passwords), modify existing data, or potentially execute arbitrary commands on the database server, leading to complete system compromise.

03 // Deep Technical Analysis

The vulnerability stems from insufficient input validation within the /admin/registration.php file, specifically when handling the fname parameter. The application fails to sanitize user-supplied input before incorporating it into a SQL query. This allows an attacker to inject malicious SQL code, manipulating the query's logic to extract sensitive information, modify data, or execute arbitrary commands on the database server. The root cause is a lack of parameterized queries or proper input sanitization using functions like mysqli_real_escape_string() or prepared statements. The absence of these security measures allows for direct injection of malicious SQL commands.

CVE-2026-3406 - MEDIUM Severity (6.9) | Free CVE Database | 4nuxd