Description
A security vulnerability has been detected in code-projects Online Reviewer System 1.0. The affected element is an unknown function of the file /login/index.php of the component Login. The manipulation of the argument username/password leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-02-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Patch
AI Analysis

Impact

An input validation flaw in the /login/index.php file of Online Reviewer System 1.0 allows an attacker to manipulate the username or password fields, leading to a SQL injection vulnerability. The flaw permits execution of arbitrary SQL statements, which can compromise the confidentiality and integrity of the underlying data store.

Affected Systems

The affected product is Online Reviewer System 1.0 released by the code‑projects team. It is identified in the Common Platform Enumeration as fabian:online_reviewer_system:1.0.* and appears to be the only publicly available version noted in the advisory.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate to high impact on data. The EPSS score is listed as < 1%, suggesting low likelihood of exploitation in the wild. The vulnerability is not included in the CISA KEV catalog. Attack can be carried out remotely via the login interface, relying on injection of malicious input into the username and password fields as described in the CVE description.

Generated by OpenCVE AI on April 18, 2026 at 19:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install any official patch or newer version of Online Reviewer System from code-projects that addresses the SQL injection vulnerability.
  • If a patch is unavailable, modify the authentication code to use prepared statements or otherwise validate and sanitize the username and password inputs to prevent SQL injection.
  • Reduce the privileges of the database account used by the application to the minimum required for its operation to limit the impact if injection succeeds.
  • Deploy a web application firewall or similar filtering mechanism to detect and block common SQL injection patterns on the login endpoint.

Generated by OpenCVE AI on April 18, 2026 at 19:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Reviewer System
CPEs cpe:2.3:a:fabian:online_reviewer_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Reviewer System

Mon, 09 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Reviewer System
Vendors & Products Code-projects
Code-projects online Reviewer System

Sun, 08 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects Online Reviewer System 1.0. The affected element is an unknown function of the file /login/index.php of the component Login. The manipulation of the argument username/password leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
Title code-projects Online Reviewer System Login index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Reviewer System
Fabian Online Reviewer System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:45:11.200Z

Reserved: 2026-02-07T09:13:43.666Z

Link: CVE-2026-2166

cve-icon Vulnrichment

Updated: 2026-02-09T21:11:19.598Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T17:15:58.787

Modified: 2026-02-10T15:12:03.930

Link: CVE-2026-2166

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:45:08Z

Weaknesses