projectworlds Online Art Gallery Shop adminHome.php sql injection
Description
A flaw has been found in projectworlds Online Art Gallery Shop 1.0. Impacted is an unknown function of the file /admin/adminHome.php. Executing a manipulation of the argument social_linked can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unauthenticated SQL injection in projectworlds Online Art Gallery Shop 1.0 via the social_linked parameter in /admin/adminHome.php.
Vulnerability
A SQL injection vulnerability exists in /admin/adminHome.php of projectworlds Online Art Gallery Shop version 1.0. The social_linked parameter is passed directly into SQL queries without proper sanitization or validation, allowing an attacker to inject arbitrary SQL commands [1]. No authentication is required to reach the vulnerable endpoint [1].
Exploitation
An unauthenticated attacker can send a crafted POST request to /admin/adminHome.php with a malicious payload in the social_linked parameter. Proof-of-concept code has been published, demonstrating boolean-based blind injection using RLIKE clauses to extract data [1]. The attack can be executed remotely without any user interaction or prior privileges [1].
Impact
Successful exploitation allows an attacker to perform unauthorized database operations, including reading sensitive data, modifying or deleting records, and potentially gaining comprehensive control over the application. This can lead to data leakage, integrity loss, and service disruption [1].
Mitigation
As of the published date of this CVE, no official fix has been released by projectworlds. The vendor has not provided a patched version or workarounds. Users should immediately restrict network access to the admin panel, apply input validation and parameterized queries, or consider migrating to an alternative solution if no update is forthcoming [1].
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: =1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/Quafather/cve/issues/1mitreexploitissue-tracking
- vuldb.com/submit/813133mitrethird-party-advisory
- vuldb.com/vuln/365327mitrevdb-entrytechnical-description
- vuldb.com/vuln/365327/ctimitresignaturepermissions-required
News mentions
0No linked articles in our index yet.