CVE-2026-2166: SQL Injection in code-projects Online Reviewer System
CVE-2026-2166 is a medium severity SQL Injection vulnerability in the code-projects Online Reviewer System version 1. 0, specifically in the /login/index. php login component. The vulnerability allows remote attackers to manipulate the username or password parameters to execute arbitrary SQL commands without authentication or user interaction. This can lead to partial compromise of confidentiality, integrity, and availability of the affected system. Although no known exploits are currently observed in the wild, the vulnerability is publicly disclosed and exploitable over the network. European organizations using this system risk unauthorized data access or modification. Mitigation requires immediate code review and implementation of parameterized queries or prepared statements, along with input validation and monitoring. Countries with higher adoption of this product or with strategic sectors relying on it are more at risk. The CVSS 4.
AI Analysis
Technical Summary
CVE-2026-2166 identifies a SQL Injection vulnerability in the Online Reviewer System version 1.0 developed by code-projects. The vulnerability resides in the login component, specifically in the /login/index.php file, where the username and password parameters are improperly sanitized. This allows an unauthenticated remote attacker to inject malicious SQL code through these parameters, potentially manipulating backend database queries. The attack vector is network-based with no required privileges or user interaction, making exploitation straightforward once the system is accessible. The vulnerability can lead to unauthorized data disclosure, modification, or deletion, impacting confidentiality, integrity, and availability. The CVSS 4.0 vector indicates no privileges or user interaction are required, with low complexity and partial impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the public disclosure increases the risk of exploitation. The absence of patches or vendor advisories necessitates immediate defensive measures. This vulnerability is critical for environments where the Online Reviewer System manages sensitive or critical data, as attackers could leverage this flaw to bypass authentication or extract sensitive information from the database.
Potential Impact
For European organizations using the code-projects Online Reviewer System 1.0, this vulnerability poses a significant risk of unauthorized access to sensitive data, including user credentials and review content. Exploitation could lead to data breaches, data integrity violations, and potential service disruptions. Organizations in sectors such as education, research, or any domain relying on this system for peer review or content validation may face reputational damage and regulatory penalties under GDPR if personal data is exposed. The remote and unauthenticated nature of the exploit increases the attack surface, especially for publicly accessible systems. Additionally, attackers could use this vulnerability as a foothold for further lateral movement within the network. The medium severity rating suggests moderate but non-negligible risk, emphasizing the need for timely remediation to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Immediately audit and review the login code, focusing on the /login/index.php file, to identify and remediate unsafe SQL query constructions. 2. Implement parameterized queries or prepared statements to prevent SQL injection attacks. 3. Apply strict input validation and sanitization on all user-supplied data, especially username and password fields. 4. Restrict database user permissions to the minimum necessary to limit potential damage from injection attacks. 5. Monitor logs for unusual login attempts or SQL errors that may indicate exploitation attempts. 6. If possible, isolate the Online Reviewer System behind a web application firewall (WAF) configured to detect and block SQL injection patterns. 7. Engage with the vendor or development team to obtain or request official patches or updates. 8. Conduct penetration testing and code reviews regularly to detect similar vulnerabilities. 9. Educate administrators and developers about secure coding practices related to database interactions. 10. Consider network segmentation to limit exposure of the vulnerable system to untrusted networks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2026-2166: SQL Injection in code-projects Online Reviewer System
Description
CVE-2026-2166 is a medium severity SQL Injection vulnerability in the code-projects Online Reviewer System version 1. 0, specifically in the /login/index. php login component. The vulnerability allows remote attackers to manipulate the username or password parameters to execute arbitrary SQL commands without authentication or user interaction. This can lead to partial compromise of confidentiality, integrity, and availability of the affected system. Although no known exploits are currently observed in the wild, the vulnerability is publicly disclosed and exploitable over the network. European organizations using this system risk unauthorized data access or modification. Mitigation requires immediate code review and implementation of parameterized queries or prepared statements, along with input validation and monitoring. Countries with higher adoption of this product or with strategic sectors relying on it are more at risk. The CVSS 4.
AI-Powered Analysis
Technical Analysis
CVE-2026-2166 identifies a SQL Injection vulnerability in the Online Reviewer System version 1.0 developed by code-projects. The vulnerability resides in the login component, specifically in the /login/index.php file, where the username and password parameters are improperly sanitized. This allows an unauthenticated remote attacker to inject malicious SQL code through these parameters, potentially manipulating backend database queries. The attack vector is network-based with no required privileges or user interaction, making exploitation straightforward once the system is accessible. The vulnerability can lead to unauthorized data disclosure, modification, or deletion, impacting confidentiality, integrity, and availability. The CVSS 4.0 vector indicates no privileges or user interaction are required, with low complexity and partial impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the public disclosure increases the risk of exploitation. The absence of patches or vendor advisories necessitates immediate defensive measures. This vulnerability is critical for environments where the Online Reviewer System manages sensitive or critical data, as attackers could leverage this flaw to bypass authentication or extract sensitive information from the database.
Potential Impact
For European organizations using the code-projects Online Reviewer System 1.0, this vulnerability poses a significant risk of unauthorized access to sensitive data, including user credentials and review content. Exploitation could lead to data breaches, data integrity violations, and potential service disruptions. Organizations in sectors such as education, research, or any domain relying on this system for peer review or content validation may face reputational damage and regulatory penalties under GDPR if personal data is exposed. The remote and unauthenticated nature of the exploit increases the attack surface, especially for publicly accessible systems. Additionally, attackers could use this vulnerability as a foothold for further lateral movement within the network. The medium severity rating suggests moderate but non-negligible risk, emphasizing the need for timely remediation to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Immediately audit and review the login code, focusing on the /login/index.php file, to identify and remediate unsafe SQL query constructions. 2. Implement parameterized queries or prepared statements to prevent SQL injection attacks. 3. Apply strict input validation and sanitization on all user-supplied data, especially username and password fields. 4. Restrict database user permissions to the minimum necessary to limit potential damage from injection attacks. 5. Monitor logs for unusual login attempts or SQL errors that may indicate exploitation attempts. 6. If possible, isolate the Online Reviewer System behind a web application firewall (WAF) configured to detect and block SQL injection patterns. 7. Engage with the vendor or development team to obtain or request official patches or updates. 8. Conduct penetration testing and code reviews regularly to detect similar vulnerabilities. 9. Educate administrators and developers about secure coding practices related to database interactions. 10. Consider network segmentation to limit exposure of the vulnerable system to untrusted networks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-07T09:13:43.666Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6988c4df4b57a58fa1b8187c
Added to database: 2/8/2026, 5:16:15 PM
Last enriched: 2/8/2026, 5:30:51 PM
Last updated: 2/8/2026, 6:21:19 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2169: Command Injection in D-Link DWR-M921
MediumCVE-2026-2168: Command Injection in D-Link DWR-M921
MediumCVE-2026-2167: OS Command Injection in Totolink WA300
MediumCVE-2026-2165: Missing Authentication in detronetdip E-commerce
MediumCVE-2026-2164: Unrestricted Upload in detronetdip E-commerce
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.