Description
A vulnerability was determined in code-projects Online Examination System 1.0. Affected by this issue is some unknown functionality of the file /admin_pic.php. Executing a manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Published: 2026-01-26
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted file upload
Action: Immediate Patch
AI Analysis

Impact

The flaw in the admin_pic.php module allows an attacker to upload arbitrary files without validation. Based on the description, it is inferred that an attacker can execute code on the server if a malicious script is uploaded, giving full control. This weakness falls under missing authorization and unrestricted input categories.

Affected Systems

The vulnerability exists in the code-projects Online Examination System version 1.0. The issue originates from the admin_pic.php component of this product.

Risk and Exploitability

The CVSS score of 5.3 reflects medium severity, but the EPSS score of less than 1% indicates low exploitation probability in the wild. The exploit is accessible from remote, and no protections such as authentication or file type checks are present. Even though not listed in KEV, it is inferred that remote code execution is possible if malicious files are uploaded, warranting prompt remediation.

Generated by OpenCVE AI on April 18, 2026 at 15:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the latest release of Online Examination System from the official repository, which includes proper file type validation in admin_pic.php.
  • Add server‑side MIME type and extension checks to allow only image files in admin_pic.php, rejecting all other content.
  • Configure the web server so the directory used for uploads has no execution permissions and ensure that no user‑uploaded files can be executed.

Generated by OpenCVE AI on April 18, 2026 at 15:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 28 Jan 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Examination System
CPEs cpe:2.3:a:fabian:online_examination_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Examination System

Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Examination System
Vendors & Products Code-projects
Code-projects online Examination System

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 07:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in code-projects Online Examination System 1.0. Affected by this issue is some unknown functionality of the file /admin_pic.php. Executing a manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Title code-projects Online Examination System admin_pic.php unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Examination System
Fabian Online Examination System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:57:38.085Z

Reserved: 2026-01-25T17:07:43.911Z

Link: CVE-2026-1423

cve-icon Vulnrichment

Updated: 2026-01-26T14:29:10.370Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-26T07:16:07.830

Modified: 2026-01-28T13:44:58.317

Link: CVE-2026-1423

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:15:03Z

Weaknesses