Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2197: SQL Injection in code-projects Online Reviewer System

0
Medium
VulnerabilityCVE-2026-2197cvecve-2026-2197
Published: Mon Feb 09 2026 (02/09/2026, 00:02:09 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Reviewer System

Description

CVE-2026-2197 is a medium-severity SQL injection vulnerability in version 1. 0 of the code-projects Online Reviewer System. The flaw exists in the exam-delete. php script, specifically in the handling of the test_id parameter, which is not properly sanitized. This allows an unauthenticated remote attacker to inject malicious SQL commands, potentially leading to unauthorized data access or manipulation. Although no known exploits are currently active in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The CVSS 4. 0 base score is 6. 9, reflecting the network attack vector, no required privileges or user interaction, and low impact on confidentiality, integrity, and availability. European organizations using this system for educational or assessment purposes could face data breaches or system disruptions if exploited.

AI-Powered Analysis

AILast updated: 02/09/2026, 00:45:33 UTC

Technical Analysis

CVE-2026-2197 identifies a SQL injection vulnerability in the Online Reviewer System version 1.0 developed by code-projects. The vulnerability resides in the /system/system/admins/assessments/pretest/exam-delete.php file, where the test_id parameter is improperly sanitized before being used in SQL queries. This improper input validation allows an attacker to craft malicious SQL statements that can be executed by the backend database. The attack can be initiated remotely without any authentication or user interaction, making it highly accessible to threat actors. The impact includes unauthorized reading, modification, or deletion of database records, potentially compromising sensitive assessment data or administrative functions. The CVSS 4.0 score of 6.9 reflects a medium severity, with the attack vector being network-based, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the public disclosure increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. The Online Reviewer System is typically used in educational or training environments to manage assessments, making the confidentiality and integrity of test data critical. Attackers exploiting this flaw could manipulate exam records or extract sensitive information, undermining trust and compliance with data protection regulations. The vulnerability's presence in a web-accessible administrative script further elevates the risk of exploitation by remote attackers.

Potential Impact

For European organizations, especially educational institutions and training providers using the Online Reviewer System, this vulnerability poses a significant risk to the confidentiality and integrity of assessment data. Exploitation could lead to unauthorized disclosure of exam content, manipulation of test results, or deletion of critical records, potentially disrupting academic processes and damaging institutional reputations. The breach of sensitive data could also result in violations of GDPR and other data protection laws, leading to legal and financial consequences. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation by cybercriminals or insider threats. Additionally, compromised systems could serve as footholds for further network intrusion or lateral movement within organizational IT environments. The medium severity rating suggests a moderate but tangible risk that requires timely remediation to prevent escalation or exploitation in targeted attacks.

Mitigation Recommendations

Organizations should immediately review and sanitize all inputs related to the test_id parameter in the exam-delete.php script by implementing parameterized queries or prepared statements to prevent SQL injection. If source code modification is not immediately feasible, deploying a Web Application Firewall (WAF) with custom rules to detect and block suspicious SQL injection patterns targeting this endpoint can provide interim protection. Restrict access to the administrative interface by IP whitelisting or VPN enforcement to reduce exposure. Conduct thorough logging and monitoring of access to the vulnerable script to detect anomalous activities. Organizations should also inventory their use of the Online Reviewer System to identify affected instances and prioritize patching or upgrading once official fixes become available. Regular security assessments and penetration testing focused on injection flaws can help identify similar vulnerabilities. Finally, ensure backups of critical data are current and tested to enable recovery in case of data manipulation or deletion.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T17:36:20.286Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69892ad34b57a58fa1e0cc91

Added to database: 2/9/2026, 12:31:15 AM

Last enriched: 2/9/2026, 12:45:33 AM

Last updated: 2/9/2026, 2:58:19 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats