Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1423: Unrestricted Upload in code-projects Online Examination System

0
Medium
VulnerabilityCVE-2026-1423cvecve-2026-1423
Published: Mon Jan 26 2026 (01/26/2026, 06:32:07 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Examination System

Description

CVE-2026-1423 is a medium severity vulnerability in code-projects Online Examination System version 1. 0, involving an unrestricted file upload flaw in the /admin_pic. php component. This vulnerability allows remote attackers with low privileges to upload arbitrary files without authentication or user interaction. Exploitation could lead to remote code execution or system compromise, impacting confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. European organizations using this examination system, especially educational institutions, are at risk. Mitigation requires restricting file upload functionality, implementing strict validation, and applying patches once available. Countries with higher adoption of this software or targeted education sectors are more likely to be affected. The vulnerability’s CVSS score is 5.

AI-Powered Analysis

AILast updated: 01/26/2026, 14:50:16 UTC

Technical Analysis

CVE-2026-1423 identifies an unrestricted file upload vulnerability in version 1.0 of the code-projects Online Examination System, specifically within the /admin_pic.php file. This flaw allows an attacker to remotely upload arbitrary files without requiring authentication or user interaction, exploiting a lack of proper validation and access control on the upload functionality. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L) and does not require privileges (PR:L) or user interaction (UI:N). The impact vector includes low confidentiality, integrity, and availability impacts, indicating potential for limited but meaningful damage such as unauthorized file uploads that could lead to remote code execution or defacement. Although no public exploit code is currently known in the wild, the vulnerability has been publicly disclosed, increasing the likelihood of future exploitation attempts. The affected product is primarily used in educational environments for online examinations, making the integrity and availability of the system critical for academic operations. The CVSS 4.0 score of 5.3 reflects a medium severity rating, balancing the ease of exploitation with the limited scope of affected versions and functionality. No patches or mitigations have been officially released yet, emphasizing the need for immediate defensive measures.

Potential Impact

For European organizations, particularly educational institutions using the code-projects Online Examination System 1.0, this vulnerability poses a significant risk to the integrity and availability of online examination processes. Successful exploitation could allow attackers to upload malicious files, potentially leading to remote code execution, data tampering, or denial of service. This could disrupt academic schedules, compromise sensitive student data, and damage institutional reputation. The impact extends to confidentiality if sensitive exam materials or personal data are exposed or altered. Given the critical role of online examination platforms in education, any disruption could have cascading effects on academic integrity and operational continuity. The medium severity rating suggests that while the threat is not critical, it is sufficiently serious to warrant immediate attention, especially in environments with limited security controls or where the software is widely deployed.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict access to the /admin_pic.php upload functionality, limiting it to trusted administrators only. Implement strict server-side validation of uploaded files, including file type, size, and content inspection to prevent malicious payloads. Employ web application firewalls (WAFs) to detect and block suspicious upload attempts. Monitor logs for unusual upload activity and conduct regular security audits of the examination system. Where possible, isolate the examination system within a segmented network to limit lateral movement in case of compromise. Since no official patch is currently available, consider disabling the upload feature temporarily or replacing the vulnerable component with a secure alternative. Engage with the vendor or community to obtain updates or patches and apply them promptly once released. Additionally, educate administrators on secure configuration and the risks associated with unrestricted uploads.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-25T17:07:43.911Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69777bcc4623b1157c990fe9

Added to database: 1/26/2026, 2:35:56 PM

Last enriched: 1/26/2026, 2:50:16 PM

Last updated: 1/26/2026, 6:27:28 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats