CVE-2026-2197: SQL Injection in code-projects Online Reviewer System
CVE-2026-2197 is a medium-severity SQL injection vulnerability in version 1. 0 of the code-projects Online Reviewer System. The flaw exists in the exam-delete. php script, specifically in the handling of the test_id parameter, which is not properly sanitized. This allows an unauthenticated remote attacker to inject malicious SQL commands, potentially leading to unauthorized data access or manipulation. Although no known exploits are currently active in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The CVSS 4. 0 base score is 6. 9, reflecting the network attack vector, no required privileges or user interaction, and low impact on confidentiality, integrity, and availability. European organizations using this system for educational or assessment purposes could face data breaches or system disruptions if exploited.
AI Analysis
Technical Summary
CVE-2026-2197 identifies a SQL injection vulnerability in the Online Reviewer System version 1.0 developed by code-projects. The vulnerability resides in the /system/system/admins/assessments/pretest/exam-delete.php file, where the test_id parameter is improperly sanitized before being used in SQL queries. This improper input validation allows an attacker to craft malicious SQL statements that can be executed by the backend database. The attack can be initiated remotely without any authentication or user interaction, making it highly accessible to threat actors. The impact includes unauthorized reading, modification, or deletion of database records, potentially compromising sensitive assessment data or administrative functions. The CVSS 4.0 score of 6.9 reflects a medium severity, with the attack vector being network-based, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the public disclosure increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. The Online Reviewer System is typically used in educational or training environments to manage assessments, making the confidentiality and integrity of test data critical. Attackers exploiting this flaw could manipulate exam records or extract sensitive information, undermining trust and compliance with data protection regulations. The vulnerability's presence in a web-accessible administrative script further elevates the risk of exploitation by remote attackers.
Potential Impact
For European organizations, especially educational institutions and training providers using the Online Reviewer System, this vulnerability poses a significant risk to the confidentiality and integrity of assessment data. Exploitation could lead to unauthorized disclosure of exam content, manipulation of test results, or deletion of critical records, potentially disrupting academic processes and damaging institutional reputations. The breach of sensitive data could also result in violations of GDPR and other data protection laws, leading to legal and financial consequences. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation by cybercriminals or insider threats. Additionally, compromised systems could serve as footholds for further network intrusion or lateral movement within organizational IT environments. The medium severity rating suggests a moderate but tangible risk that requires timely remediation to prevent escalation or exploitation in targeted attacks.
Mitigation Recommendations
Organizations should immediately review and sanitize all inputs related to the test_id parameter in the exam-delete.php script by implementing parameterized queries or prepared statements to prevent SQL injection. If source code modification is not immediately feasible, deploying a Web Application Firewall (WAF) with custom rules to detect and block suspicious SQL injection patterns targeting this endpoint can provide interim protection. Restrict access to the administrative interface by IP whitelisting or VPN enforcement to reduce exposure. Conduct thorough logging and monitoring of access to the vulnerable script to detect anomalous activities. Organizations should also inventory their use of the Online Reviewer System to identify affected instances and prioritize patching or upgrading once official fixes become available. Regular security assessments and penetration testing focused on injection flaws can help identify similar vulnerabilities. Finally, ensure backups of critical data are current and tested to enable recovery in case of data manipulation or deletion.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2026-2197: SQL Injection in code-projects Online Reviewer System
Description
CVE-2026-2197 is a medium-severity SQL injection vulnerability in version 1. 0 of the code-projects Online Reviewer System. The flaw exists in the exam-delete. php script, specifically in the handling of the test_id parameter, which is not properly sanitized. This allows an unauthenticated remote attacker to inject malicious SQL commands, potentially leading to unauthorized data access or manipulation. Although no known exploits are currently active in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The CVSS 4. 0 base score is 6. 9, reflecting the network attack vector, no required privileges or user interaction, and low impact on confidentiality, integrity, and availability. European organizations using this system for educational or assessment purposes could face data breaches or system disruptions if exploited.
AI-Powered Analysis
Technical Analysis
CVE-2026-2197 identifies a SQL injection vulnerability in the Online Reviewer System version 1.0 developed by code-projects. The vulnerability resides in the /system/system/admins/assessments/pretest/exam-delete.php file, where the test_id parameter is improperly sanitized before being used in SQL queries. This improper input validation allows an attacker to craft malicious SQL statements that can be executed by the backend database. The attack can be initiated remotely without any authentication or user interaction, making it highly accessible to threat actors. The impact includes unauthorized reading, modification, or deletion of database records, potentially compromising sensitive assessment data or administrative functions. The CVSS 4.0 score of 6.9 reflects a medium severity, with the attack vector being network-based, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the public disclosure increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. The Online Reviewer System is typically used in educational or training environments to manage assessments, making the confidentiality and integrity of test data critical. Attackers exploiting this flaw could manipulate exam records or extract sensitive information, undermining trust and compliance with data protection regulations. The vulnerability's presence in a web-accessible administrative script further elevates the risk of exploitation by remote attackers.
Potential Impact
For European organizations, especially educational institutions and training providers using the Online Reviewer System, this vulnerability poses a significant risk to the confidentiality and integrity of assessment data. Exploitation could lead to unauthorized disclosure of exam content, manipulation of test results, or deletion of critical records, potentially disrupting academic processes and damaging institutional reputations. The breach of sensitive data could also result in violations of GDPR and other data protection laws, leading to legal and financial consequences. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation by cybercriminals or insider threats. Additionally, compromised systems could serve as footholds for further network intrusion or lateral movement within organizational IT environments. The medium severity rating suggests a moderate but tangible risk that requires timely remediation to prevent escalation or exploitation in targeted attacks.
Mitigation Recommendations
Organizations should immediately review and sanitize all inputs related to the test_id parameter in the exam-delete.php script by implementing parameterized queries or prepared statements to prevent SQL injection. If source code modification is not immediately feasible, deploying a Web Application Firewall (WAF) with custom rules to detect and block suspicious SQL injection patterns targeting this endpoint can provide interim protection. Restrict access to the administrative interface by IP whitelisting or VPN enforcement to reduce exposure. Conduct thorough logging and monitoring of access to the vulnerable script to detect anomalous activities. Organizations should also inventory their use of the Online Reviewer System to identify affected instances and prioritize patching or upgrading once official fixes become available. Regular security assessments and penetration testing focused on injection flaws can help identify similar vulnerabilities. Finally, ensure backups of critical data are current and tested to enable recovery in case of data manipulation or deletion.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-07T17:36:20.286Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69892ad34b57a58fa1e0cc91
Added to database: 2/9/2026, 12:31:15 AM
Last enriched: 2/9/2026, 12:45:33 AM
Last updated: 2/9/2026, 2:58:19 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2210: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2203: Buffer Overflow in Tenda AC8
HighCVE-2026-2202: Buffer Overflow in Tenda AC8
HighCVE-2026-2201: Cross Site Scripting in ZeroWdd studentmanager
MediumCVE-2026-2200: Cross Site Scripting in heyewei JFinalCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.