Description
A vulnerability was found in code-projects Online Examination System 1.0. Affected by this vulnerability is an unknown functionality of the file /index.php of the component Login Page. Performing a manipulation of the argument User results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
Published: 2026-01-26
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker to manipulate the User parameter on the Login Page’s index.php, causing the application to concatenate unsanitized input into an SQL statement. This injection flaw is a classic input validation weakness, classified as CWE‑74 and CWE‑89. An attacker can execute arbitrary SQL queries against the underlying database, potentially reading, modifying, or deleting exam data, user credentials, or other sensitive information, thereby compromising data confidentiality and integrity. The flaw does not directly impact system availability, but could allow credential theft that enables further attacks.

Affected Systems

The affected system is the code‑projects Online Examination System, version 1.0. The vulnerability resides in the Login Page component (index.php) and is the only documented entry point susceptible to this injection. No other versions or vendor products are listed as affected.

Risk and Exploitability

The CVSS score of 6.9 places the issue in the medium severity range. The EPSS score of less than 1% indicates a low probability of exploitation in the near term, yet an exploit has been publicly published, proving the flaw is actionable. The vulnerability is not listed in the C KEV catalog, so large‑scale exploitation has not yet been observed. Nonetheless, based on the description, it is inferred that the injection can be triggered remotely and without authentication, so the risk to organizations running unpatched code remains significant.

Generated by OpenCVE AI on April 18, 2026 at 19:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Replace raw query construction in index.php with prepared statements or an ORM that parameterizes all user input
  • Enforce strict input validation on the User field by allowing only alphanumeric characters and limiting input length to the expected credential size
  • Configure the database server to reject remote connections from the web application and enable SQL strict mode to reduce successful injection attempts

Generated by OpenCVE AI on April 18, 2026 at 19:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 28 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Examination System
CPEs cpe:2.3:a:fabian:online_examination_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Examination System

Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Examination System
Vendors & Products Code-projects
Code-projects online Examination System

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 06:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects Online Examination System 1.0. Affected by this vulnerability is an unknown functionality of the file /index.php of the component Login Page. Performing a manipulation of the argument User results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
Title code-projects Online Examination System Login Page index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Examination System
Fabian Online Examination System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:57:24.562Z

Reserved: 2026-01-25T17:07:40.992Z

Link: CVE-2026-1422

cve-icon Vulnrichment

Updated: 2026-01-26T14:43:29.081Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-26T07:16:07.570

Modified: 2026-01-28T14:07:37.900

Link: CVE-2026-1422

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T20:00:09Z

Weaknesses