Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2173: SQL Injection in code-projects Online Examination System

0
Medium
VulnerabilityCVE-2026-2173cvecve-2026-2173
Published: Sun Feb 08 2026 (02/08/2026, 18:32:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Examination System

Description

CVE-2026-2173 is a medium severity SQL injection vulnerability found in version 1. 0 of the code-projects Online Examination System, specifically in the login. php file. The flaw arises from improper sanitization of the username and password parameters, allowing remote attackers to inject malicious SQL queries without authentication or user interaction. Exploiting this vulnerability could lead to unauthorized data access, data modification, or disruption of the examination system's availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations relying on this software for online assessments. European educational institutions and certification bodies using this system are particularly at risk. Mitigation requires immediate input validation, parameterized queries, and applying patches once available. Countries with higher adoption of this software and critical online education infrastructure, such as Germany, France, and the UK, are most likely to be affected. Given the ease of exploitation and potential impact on confidentiality and integrity, the vulnerability demands prompt attention from defenders.

AI-Powered Analysis

AILast updated: 02/08/2026, 19:16:01 UTC

Technical Analysis

CVE-2026-2173 identifies a SQL injection vulnerability in the code-projects Online Examination System version 1.0, specifically within the login.php file. The vulnerability stems from inadequate input validation and sanitization of the username and password parameters, which are directly used in SQL queries. This allows an unauthenticated remote attacker to craft malicious input that alters the intended SQL command, potentially bypassing authentication controls or extracting sensitive data from the backend database. The attack vector requires no user interaction and no privileges, making it highly accessible. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the vulnerability impacts confidentiality, integrity, and availability at a low level but is easy to exploit remotely. Although no public exploits are known yet, the vulnerability could be leveraged to compromise user credentials, manipulate examination results, or disrupt service availability. The lack of patches or vendor advisories increases the urgency for organizations to implement defensive coding practices and monitoring. The vulnerability is particularly critical for environments where the Online Examination System is used to conduct high-stakes assessments, as data integrity and confidentiality are paramount.

Potential Impact

For European organizations, especially educational institutions and certification authorities relying on the code-projects Online Examination System, this vulnerability could lead to unauthorized access to sensitive student or candidate data, including personal information and exam results. Attackers could manipulate exam outcomes, undermining the credibility of certifications and assessments. The disruption of examination services could affect operational continuity, particularly during critical testing periods. Data breaches resulting from exploitation could also lead to regulatory non-compliance under GDPR, resulting in legal and financial penalties. The medium severity rating indicates a moderate but tangible risk, with potential reputational damage and loss of trust in affected organizations. Given the remote exploitation capability without authentication, the threat surface is broad, increasing the likelihood of targeted attacks against European educational infrastructure.

Mitigation Recommendations

Organizations should immediately audit their deployment of the code-projects Online Examination System version 1.0 and restrict access to the login.php endpoint through network segmentation and web application firewalls (WAFs) with SQL injection detection rules. Implement strict input validation and sanitization for all user-supplied data, especially username and password fields. Refactor the application code to use parameterized queries or prepared statements to eliminate direct SQL concatenation. Monitor logs for suspicious login attempts or anomalous query patterns indicative of injection attempts. Until an official patch is released, consider deploying virtual patching via WAF or IPS solutions. Educate administrators and developers about secure coding practices to prevent similar vulnerabilities. Regularly back up examination data and verify integrity to enable recovery in case of compromise. Engage with the vendor for updates and apply patches promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T14:54:02.677Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6988dd7b4b57a58fa1c1b040

Added to database: 2/8/2026, 7:01:15 PM

Last enriched: 2/8/2026, 7:16:01 PM

Last updated: 2/8/2026, 9:30:12 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats