Description
A vulnerability was detected in code-projects Online Reviewer System 1.0. This affects an unknown part of the file /system/system/admins/manage/users/btn_functions.php. The manipulation of the argument firstname results in cross site scripting. It is possible to launch the attack remotely. The exploit is now public and may be used.
Published: 2026-02-09
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (client‑side injection)
Action: Apply Patch
AI Analysis

Impact

Affected is a part of the btn_functions.php file in the Online Reviewer System. The firstname parameter, when manipulated, results in cross‑site scripting, allowing an attacker to execute arbitrary script in a browser context. The vulnerability is classified as CWE‑79 and may also involve CWE‑94.

Affected Systems

The vulnerability impacts the code‑projects Online Reviewer System version 1.0. The problematic code resides in the manage/users/btn_functions.php file. All installations running this version are potentially vulnerable until patched.

Risk and Exploitability

The CVSS score is 5.1, indicating a moderate severity. The EPSS score is less than 1 %, implying a low probability of exploitation at the time of analysis, but the exploit is publicly available and may be used. The vulnerability is not listed in CISA’s KEV catalog. Attackers can target the endpoint remotely by sending a crafted request to the script with a malicious firstname value, causing the script to run in the victim’s browser.

Generated by OpenCVE AI on April 18, 2026 at 13:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor's latest patch or upgrade to a fixed release of Online Reviewer System.
  • Sanitize and HTML‑encode the firstname parameter before rendering it in any browser context.
  • Deploy a content‑security‑policy header that blocks inline scripts and restricts script sources.
  • If a patch is unavailable, restrict access to the btn_functions.php endpoint or restrict the user role that can invoke it.

Generated by OpenCVE AI on April 18, 2026 at 13:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Reviewer System
CPEs cpe:2.3:a:fabian:online_reviewer_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Reviewer System

Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Reviewer System
Vendors & Products Code-projects
Code-projects online Reviewer System

Mon, 09 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 09:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in code-projects Online Reviewer System 1.0. This affects an unknown part of the file /system/system/admins/manage/users/btn_functions.php. The manipulation of the argument firstname results in cross site scripting. It is possible to launch the attack remotely. The exploit is now public and may be used.
Title code-projects Online Reviewer System btn_functions.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Reviewer System
Fabian Online Reviewer System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:59:08.581Z

Reserved: 2026-02-08T16:00:28.208Z

Link: CVE-2026-2224

cve-icon Vulnrichment

Updated: 2026-02-09T14:50:25.331Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T09:16:34.403

Modified: 2026-02-10T13:59:24.320

Link: CVE-2026-2224

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses