Description
A security flaw has been discovered in code-projects Online Reviewer System 1.0. Affected is an unknown function of the file /login/index.php of the component Login. Performing a manipulation of the argument Username results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-02-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection leading to unauthorized database access or modification
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in an unknown function within the /login/index.php file of version 1.0 of code-projects Online Reviewer System. By manipulating the Username argument, an attacker can inject arbitrary SQL statements, potentially gaining unauthorized access to or modifying the data stored in the underlying database. The flaw is a classic SQL injection (CWE-89) and also reflects input handling weaknesses (CWE-74).

Affected Systems

The affected product is code-projects Online Reviewer System, version 1.0, running on the platform identified by the CPE cpe:2.3:a:fabian:online_reviewer_system:1.0:*:*:*:*:*:*:*. Users employing this outdated version are directly exposed to the flaw.

Risk and Exploitability

The CVSS base score of 6.9 indicates moderate to high risk. The EPSS score is below 1%, suggesting that, while the vulnerability exists and exploitation code is publicly available, the likelihood of an actual attack is relatively low at this time. The vulnerability is not listed in CISA’s KEV catalog. The attack vector is remote, accessed through the web login interface, and requires only a crafted Username value to be sent to the vulnerable application. Because the flaw has been publicly disclosed, attackers can readily craft exploit payloads.

Generated by OpenCVE AI on April 17, 2026 at 21:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest version of Online Reviewer System if a patch is available.
  • Rewrite the login routine to use parameterized queries or prepared statements for the Username field to eliminate raw SQL injection vectors.
  • Apply the principle of least privilege to the database user account used by the application, restricting it to only required operations.
  • Optionally, restrict access to the login endpoint via firewall rules or IP whitelisting to reduce the exposed attack surface.

Generated by OpenCVE AI on April 17, 2026 at 21:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Reviewer System
CPEs cpe:2.3:a:fabian:online_reviewer_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Reviewer System

Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Reviewer System
Vendors & Products Code-projects
Code-projects online Reviewer System

Mon, 09 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 07:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in code-projects Online Reviewer System 1.0. Affected is an unknown function of the file /login/index.php of the component Login. Performing a manipulation of the argument Username results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
Title code-projects Online Reviewer System Login index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Reviewer System
Fabian Online Reviewer System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:58:27.805Z

Reserved: 2026-02-08T16:00:10.645Z

Link: CVE-2026-2221

cve-icon Vulnrichment

Updated: 2026-02-09T15:41:45.758Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T07:16:18.923

Modified: 2026-02-10T14:00:38.513

Link: CVE-2026-2221

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:45:28Z

Weaknesses