CVE-2026-1423: Unrestricted Upload in code-projects Online Examination System
A vulnerability was determined in code-projects Online Examination System 1.0. Affected by this issue is some unknown functionality of the file /admin_pic.php. Executing a manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2026-1423 identifies an unrestricted file upload vulnerability in version 1.0 of the code-projects Online Examination System, specifically within the /admin_pic.php file. This flaw allows an attacker to remotely upload arbitrary files without requiring authentication or user interaction, exploiting a lack of proper validation and access control on the upload functionality. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L) and does not require privileges (PR:L) or user interaction (UI:N). The impact vector includes low confidentiality, integrity, and availability impacts, indicating potential for limited but meaningful damage such as unauthorized file uploads that could lead to remote code execution or defacement. Although no public exploit code is currently known in the wild, the vulnerability has been publicly disclosed, increasing the likelihood of future exploitation attempts. The affected product is primarily used in educational environments for online examinations, making the integrity and availability of the system critical for academic operations. The CVSS 4.0 score of 5.3 reflects a medium severity rating, balancing the ease of exploitation with the limited scope of affected versions and functionality. No patches or mitigations have been officially released yet, emphasizing the need for immediate defensive measures.
Potential Impact
For European organizations, particularly educational institutions using the code-projects Online Examination System 1.0, this vulnerability poses a significant risk to the integrity and availability of online examination processes. Successful exploitation could allow attackers to upload malicious files, potentially leading to remote code execution, data tampering, or denial of service. This could disrupt academic schedules, compromise sensitive student data, and damage institutional reputation. The impact extends to confidentiality if sensitive exam materials or personal data are exposed or altered. Given the critical role of online examination platforms in education, any disruption could have cascading effects on academic integrity and operational continuity. The medium severity rating suggests that while the threat is not critical, it is sufficiently serious to warrant immediate attention, especially in environments with limited security controls or where the software is widely deployed.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict access to the /admin_pic.php upload functionality, limiting it to trusted administrators only. Implement strict server-side validation of uploaded files, including file type, size, and content inspection to prevent malicious payloads. Employ web application firewalls (WAFs) to detect and block suspicious upload attempts. Monitor logs for unusual upload activity and conduct regular security audits of the examination system. Where possible, isolate the examination system within a segmented network to limit lateral movement in case of compromise. Since no official patch is currently available, consider disabling the upload feature temporarily or replacing the vulnerable component with a secure alternative. Engage with the vendor or community to obtain updates or patches and apply them promptly once released. Additionally, educate administrators on secure configuration and the risks associated with unrestricted uploads.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2026-1423: Unrestricted Upload in code-projects Online Examination System
Description
A vulnerability was determined in code-projects Online Examination System 1.0. Affected by this issue is some unknown functionality of the file /admin_pic.php. Executing a manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2026-1423 identifies an unrestricted file upload vulnerability in version 1.0 of the code-projects Online Examination System, specifically within the /admin_pic.php file. This flaw allows an attacker to remotely upload arbitrary files without requiring authentication or user interaction, exploiting a lack of proper validation and access control on the upload functionality. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L) and does not require privileges (PR:L) or user interaction (UI:N). The impact vector includes low confidentiality, integrity, and availability impacts, indicating potential for limited but meaningful damage such as unauthorized file uploads that could lead to remote code execution or defacement. Although no public exploit code is currently known in the wild, the vulnerability has been publicly disclosed, increasing the likelihood of future exploitation attempts. The affected product is primarily used in educational environments for online examinations, making the integrity and availability of the system critical for academic operations. The CVSS 4.0 score of 5.3 reflects a medium severity rating, balancing the ease of exploitation with the limited scope of affected versions and functionality. No patches or mitigations have been officially released yet, emphasizing the need for immediate defensive measures.
Potential Impact
For European organizations, particularly educational institutions using the code-projects Online Examination System 1.0, this vulnerability poses a significant risk to the integrity and availability of online examination processes. Successful exploitation could allow attackers to upload malicious files, potentially leading to remote code execution, data tampering, or denial of service. This could disrupt academic schedules, compromise sensitive student data, and damage institutional reputation. The impact extends to confidentiality if sensitive exam materials or personal data are exposed or altered. Given the critical role of online examination platforms in education, any disruption could have cascading effects on academic integrity and operational continuity. The medium severity rating suggests that while the threat is not critical, it is sufficiently serious to warrant immediate attention, especially in environments with limited security controls or where the software is widely deployed.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict access to the /admin_pic.php upload functionality, limiting it to trusted administrators only. Implement strict server-side validation of uploaded files, including file type, size, and content inspection to prevent malicious payloads. Employ web application firewalls (WAFs) to detect and block suspicious upload attempts. Monitor logs for unusual upload activity and conduct regular security audits of the examination system. Where possible, isolate the examination system within a segmented network to limit lateral movement in case of compromise. Since no official patch is currently available, consider disabling the upload feature temporarily or replacing the vulnerable component with a secure alternative. Engage with the vendor or community to obtain updates or patches and apply them promptly once released. Additionally, educate administrators on secure configuration and the risks associated with unrestricted uploads.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-25T17:07:43.911Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69777bcc4623b1157c990fe9
Added to database: 1/26/2026, 2:35:56 PM
Last enriched: 1/26/2026, 2:50:16 PM
Last updated: 2/7/2026, 2:48:35 PM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.