CVE-2026-3057

A security flaw has been discovered in a54552239 pearProjectApi up to 2.8.10. Affected is the function dateTotalForProject of the file application/common/Model/Task.php of the component Backend Interface. The manipulation of the argument projectCode results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/XiaoyuZhou1997/CVE/issues/1 Exploit Issue Tracking Third Party Advisory
https://github.com/XiaoyuZhou1997/CVE/issues/1#issue-3935708166 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.347413 Permissions Required VDB Entry
https://vuldb.com/?id.347413 Third Party Advisory VDB Entry
https://vuldb.com/?submit.757669 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:a54552239:pearprojectapi:*:*:*:*:*:*:*:*

History

03 Mar 2026, 17:15

Type Values Removed Values Added
References () https://github.com/XiaoyuZhou1997/CVE/issues/1 - () https://github.com/XiaoyuZhou1997/CVE/issues/1 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/XiaoyuZhou1997/CVE/issues/1#issue-3935708166 - () https://github.com/XiaoyuZhou1997/CVE/issues/1#issue-3935708166 - Exploit, Issue Tracking, Third Party Advisory
References () https://vuldb.com/?ctiid.347413 - () https://vuldb.com/?ctiid.347413 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.347413 - () https://vuldb.com/?id.347413 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.757669 - () https://vuldb.com/?submit.757669 - Third Party Advisory, VDB Entry
Summary
  • (es) Se ha descubierto una vulnerabilidad de seguridad en a54552239 pearProjectApi hasta la versión 2.8.10. Afecta a la función dateTotalForProject del archivo application/common/Model/Task.PHP del componente Interfaz de Backend. Si se manipula el argumento projectCode se puede provocar una inyección SQL. El ataque puede lanzarse de forma remota. El exploit ha sido publicado y puede ser utilizado para ataques. El proveedor fue contactado con antelación sobre esta divulgación, pero no respondió de ninguna manera.
First Time A54552239
A54552239 pearprojectapi
CPE cpe:2.3:a:a54552239:pearprojectapi:*:*:*:*:*:*:*:*

24 Feb 2026, 03:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-24 03:16

Updated : 2026-03-03 17:15


NVD link : CVE-2026-3057

Mitre link : CVE-2026-3057

CVE.ORG link : CVE-2026-3057


JSON object : View

Products Affected

a54552239

  • pearprojectapi
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')