Description
A vulnerability has been found in code-projects Online Reviewer System 1.0. This vulnerability affects unknown code of the file /system/system/admins/assessments/pretest/questions-view.php. The manipulation of the argument ID leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-02-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Compromise
Action: Immediate Patch
AI Analysis

Impact

A SQL injection flaw exists in the questions-view.php file of the Online Reviewer System. By manipulating the ID argument, an attacker can embed arbitrary SQL code. This flaw can allow read or modification of the underlying database, exposing sensitive information or corrupting data. The vulnerability is a classic injection weakness, identified as CWE-74 and CWE-89. No authentication or privilege elevation is specifically required; the flaw is exploitable with a simple crafted input.

Affected Systems

The affected product is code‑projects Online Reviewer System, version 1.0. The vulnerable code resides in /system/system/admins/assessments/pretest/questions-view.php. No other versions or builds are documented as affected in the available data.

Risk and Exploitability

The CVSS score is 6.9, indicating a moderate severity. EPSS shows an exploitation probability of less than 1 percent, and the vulnerability is not listed in the CISA KEV catalog. The attack can be carried out remotely by submitting a malicious ID value to the vulnerable endpoint. An attacker does not need any special permissions beyond access to the web interface to leverage this flaw.

Generated by OpenCVE AI on April 17, 2026 at 21:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest release of Online Reviewer System that contains the SQL injection fix.
  • Reduce the privileges of the database user used by the application to the minimum required for its operation.
  • Implement input validation or use prepared statements for the ID parameter, or employ a web application firewall to block malicious query strings.

Generated by OpenCVE AI on April 17, 2026 at 21:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Reviewer System
CPEs cpe:2.3:a:fabian:online_reviewer_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Reviewer System

Mon, 09 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Reviewer System
Vendors & Products Code-projects
Code-projects online Reviewer System

Mon, 09 Feb 2026 00:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in code-projects Online Reviewer System 1.0. This vulnerability affects unknown code of the file /system/system/admins/assessments/pretest/questions-view.php. The manipulation of the argument ID leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Title code-projects Online Reviewer System questions-view.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Reviewer System
Fabian Online Reviewer System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:51:50.404Z

Reserved: 2026-02-07T17:36:13.198Z

Link: CVE-2026-2195

cve-icon Vulnrichment

Updated: 2026-02-09T20:42:32.256Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T00:15:49.030

Modified: 2026-02-10T15:09:37.843

Link: CVE-2026-2195

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:45:28Z

Weaknesses