Description
A security flaw has been discovered in code-projects Online Reviewer System 1.0. The impacted element is an unknown function of the file /reviewer/system/system/admins/manage/users/user-delete.php. Performing a manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-02-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A SQL injection flaw exists in code‑projects Online Reviewer System version 1.0 within the file /reviewer/system/system/admins/manage/users/user-delete.php. Manipulating the ID parameter allows an attacker to inject arbitrary SQL statements, potentially leading to data disclosure, modification, or deletion. The vulnerability corresponds to CWE‑89 and involves improper handling of user-supplied input (CWE‑74).

Affected Systems

The affected product is code‑projects Online Reviewer System 1.0, as identified by the vendor and the common platform enumeration for the online_reviewer_system application.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity while the EPSS score of less than 1% suggests a low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. It can be initiated remotely by sending crafted HTTP requests to the vulnerable endpoint. No elevated privileges are required; any external user capable of constructing the request could potentially exploit the flaw.

Generated by OpenCVE AI on April 18, 2026 at 13:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑released patch for Online Reviewer System 1.0 as soon as it becomes available.
  • Restrict direct access to user‑delete.php to authenticated administrators only, implementing robust authentication and role‑based access controls at the application and web‑server level.
  • Update the application to use parameterized queries or prepared statements for all SQL interactions involving the ID parameter to eliminate injection vectors.

Generated by OpenCVE AI on April 18, 2026 at 13:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Reviewer System
CPEs cpe:2.3:a:fabian:online_reviewer_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Reviewer System

Mon, 09 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Reviewer System
Vendors & Products Code-projects
Code-projects online Reviewer System

Mon, 09 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in code-projects Online Reviewer System 1.0. The impacted element is an unknown function of the file /reviewer/system/system/admins/manage/users/user-delete.php. Performing a manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.
Title code-projects Online Reviewer System user-delete.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Reviewer System
Fabian Online Reviewer System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:52:42.110Z

Reserved: 2026-02-07T17:36:25.638Z

Link: CVE-2026-2199

cve-icon Vulnrichment

Updated: 2026-02-09T16:34:27.252Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T01:16:04.227

Modified: 2026-02-10T15:07:42.540

Link: CVE-2026-2199

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses