Description
Sourcecodester Online Reviewer System v1.0 is vulnerale to SQL Injection in the file /system/system/admins/assessments/examproper/exam-update.php.
Published: 2026-04-13
Score: 2.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection allowing unauthorized database manipulation
Action: Apply Fix
AI Analysis

Impact

Sourcecodester Online Reviewer System version 1.0 contains a SQL Injection flaw within the file exam‑update.php. The weakness, identified as CWE‑89, permits an attacker who can supply crafted input to the web interface to append or replace SQL code executed against the database. Through successful exploitation an attacker could read, modify, or delete data stored by the application, potentially exposing confidential information or disrupting business operations.

Affected Systems

The vulnerability affects the Online Reviewer System supplied by Sourcecodester, specifically version 1.0. The vulnerable component resides under \/system\/system\/admins\/assessments\/examproper\/exam-update.php.

Risk and Exploitability

The CVSS score of 2.7 indicates a low severity vulnerability, and the EPSS score of less than 1% suggests a low probability of exploitation. The vulnerability is likely exploitable via the web interface (remote attack vector), inferred from the location of the flaw in a publicly accessible PHP file. No patches or mitigations have been listed in the vendor’s advisory, and the issue is not present in the CISA KEV catalog. Even though the risk level is low, the nature of a SQL Injection flaw warrants timely remediation to prevent potential data loss or corruption.

Generated by OpenCVE AI on April 14, 2026 at 14:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify that the system is indeed running version 1.0 of the Sourcecodester Online Reviewer System
  • Apply any available vendor patch or update to version 1.0 or later
  • If no patch exists, refactor the exam‑update.php code to use prepared statements or parameterized queries for all database interactions
  • Limit the database user privileges to the minimum required for the application
  • Sanitize all user input on the server side before it is incorporated into SQL statements
  • Implement logging and monitoring for unusual database activity
  • Restrict network access to the application to trusted users only

Generated by OpenCVE AI on April 14, 2026 at 14:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title SQL Injection Vulnerability in Sourcecodester Online Reviewer System v1.0

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester online Reviewer System
Vendors & Products Sourcecodester
Sourcecodester online Reviewer System

Tue, 14 Apr 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Janobe
Janobe online Reviewer System
CPEs cpe:2.3:a:janobe:online_reviewer_system:1.0:*:*:*:*:*:*:*
Vendors & Products Janobe
Janobe online Reviewer System

Mon, 13 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title SQL Injection Vulnerability in Sourcecodester Online Reviewer System v1.0
Weaknesses CWE-89

Mon, 13 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
Description Sourcecodester Online Reviewer System v1.0 is vulnerale to SQL Injection in the file /system/system/admins/assessments/examproper/exam-update.php.
References

Subscriptions

Janobe Online Reviewer System
Sourcecodester Online Reviewer System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-13T20:42:33.733Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-36919

cve-icon Vulnrichment

Updated: 2026-04-13T20:42:30.600Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-13T13:16:41.783

Modified: 2026-04-14T11:52:16.307

Link: CVE-2026-36919

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:36:06Z

Weaknesses