Description
A vulnerability was identified in code-projects Online Reviewer System 1.0. The affected element is an unknown function of the file /system/system/admins/assessments/pretest/loaddata.php. Such manipulation of the argument difficulty_id leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Published: 2026-02-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Patch Now
AI Analysis

Impact

The vulnerability involves an SQL injection flaw in the loaddata.php component of Online Reviewer System 1.0. By manipulating the difficulty_id argument, an attacker can inject arbitrary SQL commands, potentially allowing data exfiltration or modification. The flaw is classified under CWE-74 and CWE-89, typical examples of unsanitized input leading to injection attacks.

Affected Systems

The flaw affects code-projects' Online Reviewer System, version 1.0. No other versions were listed in the advisory. The exposure occurs in the /system/system/admins/assessments/pretest/loaddata.php file of the 1.0 release, and the affected CPE is cpe:2.3:a:fabian:online_reviewer_system:1.0:…. Administrators using this package should verify their installed version.

Risk and Exploitability

The CVSS score is 6.9, indicating moderate severity, and the EPSS score is less than 1%, suggesting a low probability of exploitation at present. The vulnerability can be triggered remotely via HTTP requests to the affected endpoint, and the exploit is publicly available. Though it has not been listed in the CISA KEV catalog, the public availability combined with the remote attack vector warrants timely remediation.

Generated by OpenCVE AI on April 17, 2026 at 21:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor patch or update to a fixed version of Online Reviewer System if available.
  • Update the loaddata.php code to validate the difficulty_id parameter and use prepared statements or parameterized queries to prevent injection.
  • Deploy web application firewall rules or intrusion detection signatures to detect and block malicious SQL injection payloads targeting the difficulty_id parameter.

Generated by OpenCVE AI on April 17, 2026 at 21:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Reviewer System
CPEs cpe:2.3:a:fabian:online_reviewer_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Reviewer System

Mon, 09 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Reviewer System
Vendors & Products Code-projects
Code-projects online Reviewer System

Mon, 09 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in code-projects Online Reviewer System 1.0. The affected element is an unknown function of the file /system/system/admins/assessments/pretest/loaddata.php. Such manipulation of the argument difficulty_id leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Title code-projects Online Reviewer System loaddata.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Reviewer System
Fabian Online Reviewer System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:52:29.327Z

Reserved: 2026-02-07T17:36:22.979Z

Link: CVE-2026-2198

cve-icon Vulnrichment

Updated: 2026-02-09T20:49:54.062Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T01:16:04.043

Modified: 2026-02-10T15:07:52.150

Link: CVE-2026-2198

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:45:28Z

Weaknesses