Description
A vulnerability was found in code-projects Online Reviewer System 1.0. Impacted is an unknown function of the file /system/system/students/assessments/results/studentresult-view.php. The manipulation of the argument test_id results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used.
Published: 2026-02-22
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Apply Patch
AI Analysis

Impact

A flaw exists in the Online Reviewer System 1.0 in the studentresult-view.php component where the test_id parameter can be manipulated to inject arbitrary SQL statements. This enables an attacker to read, modify, or delete data in the underlying database, potentially exposing sensitive student records or compromising the integrity of assessment information. The weakness is an SQL injection vulnerability (CWE‑74, CWE‑89).

Affected Systems

The affected product is code-projects Online Reviewer System, version 1.0.

Risk and Exploitability

The CVSS base score is 6.9, indicating a moderate severity. The EPSS score of less than 1% suggests low but non‑zero exploitation probability, yet the vulnerability is publicly documented and could be used remotely by an attacker. It is not listed in the KEV catalog, but the presence of a public exploit raises immediate concern. The likely attack vector is remote exploitation via the web interface, requiring the ability to send crafted HTTP requests to the studentresult-view.php page.

Generated by OpenCVE AI on April 18, 2026 at 11:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a patched or newer version of the Online Reviewer System once the vendor releases an update that eliminates the SQL injection flaw.
  • If upgrading is not currently possible, modify the application to employ parameterized queries or explicit input validation for the test_id parameter to prevent injection.
  • Restrict access to the studentresult-view.php endpoint so that only authenticated and authorized users can reach it.
  • Deploy a web application firewall with SQL injection protection rules to detect and block malicious input attempts.

Generated by OpenCVE AI on April 18, 2026 at 11:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Reviewer System
CPEs cpe:2.3:a:fabian:online_reviewer_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Reviewer System

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Reviewer System
Vendors & Products Code-projects
Code-projects online Reviewer System

Sun, 22 Feb 2026 04:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects Online Reviewer System 1.0. Impacted is an unknown function of the file /system/system/students/assessments/results/studentresult-view.php. The manipulation of the argument test_id results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used.
Title code-projects Online Reviewer System studentresult-view.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Reviewer System
Fabian Online Reviewer System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T19:15:35.013Z

Reserved: 2026-02-20T20:17:29.802Z

Link: CVE-2026-2912

cve-icon Vulnrichment

Updated: 2026-02-23T19:15:26.915Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-22T04:15:59.590

Modified: 2026-02-23T20:19:31.780

Link: CVE-2026-2912

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:15:35Z

Weaknesses