Description
A security vulnerability has been detected in code-projects Online Reviewer System 1.0. Affected by this issue is some unknown functionality of the file /system/system/students/assessments/pretest/take/index.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-02-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection
Action: Patch
AI Analysis

Impact

The vulnerability occurs in the /system/system/students/assessments/pretest/take/index.php file of code-projects Online Reviewer System 1.0. A malformed or manipulated ID argument is interpreted directly by the underlying SQL engine, enabling an attacker to inject arbitrary SQL commands. The impact is the potential disclosure and manipulation of data stored in the database, compromising confidentiality and integrity. The fault stems from improper handling of user-supplied input, reflected in the listed weaknesses CWE‑74 and CWE‑89.

Affected Systems

The affected product is code-projects Online Reviewer System version 1.0. No additional sub‑product versions are listed, and the vulnerability is tied to functionality in the pretest take interface of the application.

Risk and Exploitability

The CVSS score for this issue is 6.9, indicating a moderate-to-high risk. Although the EPSS score is below 1% and the vulnerability is not in the CISA KEV catalog, the exploit is publicly disclosed and can be triggered remotely by supplying a crafted ID value. Successful exploitation would allow an attacker to retrieve or alter database contents without authentication, making this a high‑impact flaw for systems lacking mitigation.

Generated by OpenCVE AI on April 17, 2026 at 21:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑issued patch or upgrade to a fixed version of Online Reviewer System 1.0.
  • If a patch is unavailable, modify the application to treat the ID parameter as a bound value, using parameterized queries or prepared statements to eliminate direct SQL concatenation.
  • Restrict access to the vulnerable endpoint by requiring authentication and limiting exposure to trusted networks, applying least‑privilege access controls.

Generated by OpenCVE AI on April 17, 2026 at 21:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Reviewer System
CPEs cpe:2.3:a:fabian:online_reviewer_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Reviewer System

Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Reviewer System
Vendors & Products Code-projects
Code-projects online Reviewer System

Mon, 09 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 08:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects Online Reviewer System 1.0. Affected by this issue is some unknown functionality of the file /system/system/students/assessments/pretest/take/index.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
Title code-projects Online Reviewer System index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Reviewer System
Fabian Online Reviewer System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:58:55.803Z

Reserved: 2026-02-08T16:00:24.020Z

Link: CVE-2026-2223

cve-icon Vulnrichment

Updated: 2026-02-09T15:24:16.283Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T08:16:12.090

Modified: 2026-02-10T13:59:37.573

Link: CVE-2026-2223

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:45:28Z

Weaknesses