Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1423: Unrestricted Upload in code-projects Online Examination System

0
Medium
VulnerabilityCVE-2026-1423cvecve-2026-1423
Published: Mon Jan 26 2026 (01/26/2026, 06:32:07 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Examination System

Description

A vulnerability was determined in code-projects Online Examination System 1.0. Affected by this issue is some unknown functionality of the file /admin_pic.php. Executing a manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:28:49 UTC

Technical Analysis

CVE-2026-1423 identifies an unrestricted file upload vulnerability in version 1.0 of the code-projects Online Examination System, specifically within the /admin_pic.php file. This flaw allows an attacker to remotely upload arbitrary files without requiring user interaction or authentication, leveraging a lack of proper input validation and access control on the upload functionality. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L) and no privileges required (PR:L) but does require some level of privilege, likely a low-level authenticated user, to perform the attack. The exploit can lead to partial compromise of confidentiality, integrity, and availability, such as uploading malicious scripts or executables that could be executed on the server, potentially leading to unauthorized data access, defacement, or denial of service. The vulnerability has been publicly disclosed but no active exploits have been reported in the wild. The affected product is a niche online examination system, which limits the scope of impact to organizations using this software. The CVSS 4.0 vector indicates no user interaction is needed, and the scope is unchanged, meaning the impact is confined to the vulnerable component. The lack of patches or official fixes at the time of disclosure increases the urgency for organizations to implement mitigations. The vulnerability highlights the critical need for secure file upload handling, including validation of file types, sizes, and user permissions, to prevent unauthorized uploads.

Potential Impact

The potential impact of CVE-2026-1423 includes unauthorized file uploads that can lead to remote code execution, data leakage, or service disruption within the affected Online Examination System. Organizations relying on this software may face compromise of exam data integrity and confidentiality, undermining trust in examination processes. Attackers could upload web shells or malware, enabling persistent access or lateral movement within the network. Although the vulnerability requires low privileges, it does not require user interaction, making automated exploitation feasible once an attacker gains minimal access. The impact is medium severity due to partial compromise potential and limited scope to the affected system. However, in educational institutions or certification bodies where exam integrity is critical, the consequences could be significant, including reputational damage and regulatory non-compliance. The absence of known exploits in the wild currently limits immediate risk but the public disclosure increases the likelihood of future exploitation attempts. Organizations worldwide using this product or similar vulnerable systems are at risk of targeted attacks aiming to disrupt or manipulate examination outcomes.

Mitigation Recommendations

To mitigate CVE-2026-1423, organizations should immediately restrict access to the /admin_pic.php upload functionality, ensuring it is only accessible to fully authenticated and authorized administrators. Implement strict server-side validation of uploaded files, including whitelisting allowed file types, enforcing file size limits, and scanning uploads for malware. Employ robust authentication and session management to prevent unauthorized access to upload endpoints. Where possible, isolate the upload directory from executable permissions to prevent execution of uploaded malicious files. Monitor logs for unusual upload activity and conduct regular security audits of the application. If patches or updates become available from the vendor, apply them promptly. As a compensating control, consider deploying web application firewalls (WAFs) with rules to detect and block suspicious upload attempts. Educate administrators about the risks of unrestricted uploads and enforce the principle of least privilege. Finally, consider migrating to more secure examination platforms if vendor support is lacking.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-25T17:07:43.911Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69777bcc4623b1157c990fe9

Added to database: 1/26/2026, 2:35:56 PM

Last enriched: 2/23/2026, 10:28:49 PM

Last updated: 3/25/2026, 3:20:37 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses