{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3406","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-01T06:58:32.508Z","datePublished":"2026-03-02T02:32:08.277Z","dateUpdated":"2026-03-02T14:55:46.014Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-02T02:32:08.277Z"},"title":"projectworlds Online Art Gallery Shop Registration registration.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"projectworlds","product":"Online Art Gallery Shop","versions":[{"version":"1.0","status":"affected"}],"modules":["Registration Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in projectworlds Online Art Gallery Shop 1.0. The impacted element is an unknown function of the file /admin/registration.php of the component Registration Handler. The manipulation of the argument fname results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-01T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-01T08:03:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Hy_Sec (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.348301","name":"VDB-348301 | projectworlds Online Art Gallery Shop Registration registration.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.348301","name":"VDB-348301 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.763740","name":"Submit #763740 | ProjectWorlds Online Art Gallery Shop Project v1.0 SQL injection","tags":["third-party-advisory"]},{"url":"https://github.com/ubfbuz3/cve/issues/55","tags":["exploit","issue-tracking"]}],"tags":["x_freeware"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-02T14:53:17.362267Z","id":"CVE-2026-3406","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-02T14:55:46.014Z"}}]}}