Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1422: SQL Injection in code-projects Online Examination System

0
Medium
VulnerabilityCVE-2026-1422cvecve-2026-1422
Published: Mon Jan 26 2026 (01/26/2026, 06:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Examination System

Description

CVE-2026-1422 is a medium-severity SQL Injection vulnerability found in version 1. 0 of the code-projects Online Examination System, specifically in the Login Page component via the User argument in /index. php. The vulnerability allows unauthenticated remote attackers to manipulate SQL queries, potentially leading to data leakage or modification. Although no known exploits are currently observed in the wild, a public exploit exists, increasing the risk of exploitation. The CVSS 4. 0 score is 6. 9, reflecting network attack vector, no required privileges or user interaction, and low to limited impact on confidentiality, integrity, and availability. European organizations using this examination system, especially educational institutions, could face data breaches or service disruptions. Mitigation requires immediate input validation and parameterized queries, along with monitoring and restricting access to vulnerable endpoints.

AI-Powered Analysis

AILast updated: 02/02/2026, 08:44:32 UTC

Technical Analysis

CVE-2026-1422 identifies a SQL Injection vulnerability in the code-projects Online Examination System version 1.0, specifically within the Login Page component's /index.php file. The vulnerability arises from improper sanitization of the 'User' parameter, allowing an attacker to inject malicious SQL code remotely without authentication or user interaction. This injection can manipulate backend database queries, potentially exposing sensitive user data, altering authentication logic, or corrupting data integrity. The vulnerability is exploitable over the network with low attack complexity and no privileges required, making it accessible to a wide range of attackers. The CVSS 4.0 vector indicates no confidentiality, integrity, or availability controls prevent exploitation, though the overall impact is limited to low or limited scope. While no active exploitation has been reported, a public exploit is available, increasing the urgency for remediation. The lack of patches or vendor advisories necessitates immediate defensive measures by users of this system. The vulnerability primarily threatens the confidentiality and integrity of examination data and user credentials, which are critical for educational institutions relying on this platform for assessments.

Potential Impact

For European organizations, particularly educational institutions and certification bodies using the code-projects Online Examination System, this vulnerability poses a significant risk of unauthorized data access and manipulation. Exploitation could lead to exposure of personal information, exam results, and authentication credentials, undermining trust and compliance with data protection regulations such as GDPR. Additionally, attackers could alter exam data, compromising the integrity of assessments and potentially causing reputational damage. Service availability might be affected if the database is corrupted or manipulated, disrupting examination processes. The medium severity rating reflects that while the impact is serious, it is somewhat limited by the scope of affected systems and lack of privilege requirements. However, the public availability of an exploit increases the likelihood of targeted attacks, especially in countries with large educational sectors or where this software is widely deployed.

Mitigation Recommendations

Organizations should immediately implement input validation and sanitization on the 'User' parameter to prevent SQL injection. Employing parameterized queries or prepared statements in the codebase is critical to eliminate injection vectors. If possible, restrict access to the /index.php Login Page endpoint via network controls such as firewalls or VPNs to limit exposure. Conduct thorough code reviews and security audits of the Online Examination System to identify and remediate similar vulnerabilities. Monitor logs for suspicious activity indicative of SQL injection attempts. Since no official patch is currently available, consider isolating the affected system or migrating to alternative examination platforms with stronger security postures. Educate administrators and users about the risks and signs of exploitation. Finally, ensure regular backups of examination data to enable recovery in case of data corruption or loss.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-25T17:07:40.992Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697707c94623b1157c67230d

Added to database: 1/26/2026, 6:20:57 AM

Last enriched: 2/2/2026, 8:44:32 AM

Last updated: 2/7/2026, 9:33:52 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats