Description
A security vulnerability has been detected in code-projects Online Reviewer System up to 1.0. Affected is an unknown function of the file /system/system/students/assessments/databank/btn_functions.php. Such manipulation of the argument Description leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
Published: 2026-03-27
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Assess Impact
AI Analysis

Impact

The vulnerability arises from improper handling of the ‘Description’ parameter in the btn_functions.php file, enabling an attacker to inject malicious JavaScript. When executed, the injected script runs in the victim’s browser, allowing the attacker to hijack sessions, deface pages, or phish for credentials. This is a classic reflected or stored Cross‑Site Scripting flaw, identified as CWE‑79, with potential use of arbitrary code execution via dynamic PHP execution (CWE‑94).

Affected Systems

The flaw affects the code‑projects Online Reviewer System, versions up to and including 1.0. The issue resides in the file located at /system/system/students/assessments/databank/btn_functions.php. No higher versions are mentioned, so the vulnerability is limited to the stated product versions.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate risk level. The exploit is known to be reachable from remote web requests and has been publicly disclosed, but no exploitability metrics (EPSS) are available. As it is not listed in CISA’s Known Exploited Vulnerabilities catalog, the likelihood of widespread exploitation is uncertain, though attackers could readily craft malicious payloads to target users if the system remains unpatched.

Generated by OpenCVE AI on March 28, 2026 at 06:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether an official patch or update has been released by the vendor for Online Reviewer System 1.0 or later.
  • If no patch is available, modify btn_functions.php to apply proper input sanitization (e.g., htmlspecialchars() or a dedicated validation library) before storing or rendering the Description value.
  • Implement output‑encoding for any data rendered on the web page to prevent script execution.
  • Deploy an application‑layer firewall or WAF to block known XSS payloads and monitor for suspicious activity.
  • Keep the system and all web application dependencies up‑to‑date, and routinely review logs for signs of XSS attempts.

Generated by OpenCVE AI on March 28, 2026 at 06:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Reviewer System
Vendors & Products Code-projects
Code-projects online Reviewer System

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects Online Reviewer System up to 1.0. Affected is an unknown function of the file /system/system/students/assessments/databank/btn_functions.php. Such manipulation of the argument Description leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data. A security vulnerability has been detected in code-projects Online Reviewer System up to 1.0. Affected is an unknown function of the file /system/system/students/assessments/databank/btn_functions.php. Such manipulation of the argument Description leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects Online Reviewer System up to 1.0. Affected is an unknown function of the file /system/system/students/assessments/databank/btn_functions.php. Such manipulation of the argument Description leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Title code-projects Online Reviewer System btn_functions.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 3.3, 'vector': 'AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Reviewer System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-27T22:17:39.404Z

Reserved: 2026-03-27T08:54:26.957Z

Link: CVE-2026-4972

cve-icon Vulnrichment

Updated: 2026-03-27T19:31:17.004Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-27T20:16:38.003

Modified: 2026-03-30T13:26:07.647

Link: CVE-2026-4972

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:00:48Z

Weaknesses