Description
A vulnerability was found in code-projects Online Reviewer System 1.0. This issue affects some unknown processing of the file /system/system/admins/assessments/pretest/exam-update.php. The manipulation of the argument test_id results in sql injection. The attack may be performed from remote. The exploit has been made public and could be used.
Published: 2026-02-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection causing possible data exposure or modification
Action: Apply Patch
AI Analysis

Impact

A flaw in the Online Reviewer System 1.0 allows attackers to inject arbitrary SQL through the test_id parameter in exam-update.php. The injection can modify or read database contents, potentially exposing privileged information or altering assessment data. The CVE description confirms the ability to manipulate the argument test_id and states that the attack can be performed from remote. The vulnerability is sufficiently serious to warrant remediation.

Affected Systems

This issue affects the code-projects Online Reviewer System version 1.0, specifically the file system/system/admins/assessments/pretest/exam-update.php. CPE information identifies the product as fabian online_reviewer_system 1.0. No additional affected versions are listed, so all installations of the 1.0 release are presumed vulnerable.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium severity, while the EPSS score is below 1%, suggesting current exploitation activity is very low. The vulnerability is not listed in the CISA KEV catalog, which further implies limited public exploitation. However, the remote nature of the attack and the public knowledge of the exploit mean that once a patch is available, administrators should act promptly. The combination of remote access, potential data impact, and low current threat does not justify a zero‑day urgency, but it does warrant timely patching to mitigate future risk.

Generated by OpenCVE AI on April 17, 2026 at 21:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑provided patch or upgrade the Online Reviewer System to a version where the exam-update.php SQL injection is fixed.
  • If no patch is immediately available, restrict the exam-update.php endpoint to administrative users only, ensuring that only authenticated staff have the necessary access.
  • Sanitise the test_id parameter by validating that it contains only numeric characters and replace any dynamic query construction with parameterised statements.

Generated by OpenCVE AI on April 17, 2026 at 21:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Reviewer System
CPEs cpe:2.3:a:fabian:online_reviewer_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Reviewer System

Mon, 09 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Reviewer System
Vendors & Products Code-projects
Code-projects online Reviewer System

Mon, 09 Feb 2026 00:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects Online Reviewer System 1.0. This issue affects some unknown processing of the file /system/system/admins/assessments/pretest/exam-update.php. The manipulation of the argument test_id results in sql injection. The attack may be performed from remote. The exploit has been made public and could be used.
Title code-projects Online Reviewer System exam-update.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Reviewer System
Fabian Online Reviewer System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:52:03.178Z

Reserved: 2026-02-07T17:36:17.435Z

Link: CVE-2026-2196

cve-icon Vulnrichment

Updated: 2026-02-09T20:45:58.273Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T01:16:03.633

Modified: 2026-02-10T15:11:33.047

Link: CVE-2026-2196

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:45:28Z

Weaknesses